Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 2.6 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2003-1366
chpass in OpenBSD 2.0 up to and including 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information.
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
1 EDB exploit
NA
CVE-2003-0681
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
Sendmail Advanced Message Server 1.2
Sendmail Advanced Message Server 1.3
Sendmail Sendmail 8.10
Sendmail Sendmail 8.10.1
Sendmail Sendmail 8.11.5
Sendmail Sendmail 8.11.6
Sendmail Sendmail 8.12.6
Sendmail Sendmail 8.12.7
Sendmail Sendmail 8.8.8
Sendmail Sendmail 8.9.0
Sendmail Sendmail Switch 2.1.1
Sendmail Sendmail Switch 2.1.2
Sendmail Sendmail Switch 2.2.3
Sendmail Sendmail Switch 2.2.4
Sendmail Sendmail 2.6.2
Sendmail Sendmail 3.0
Sendmail Sendmail 3.0.1
Sendmail Sendmail 8.11.1
Sendmail Sendmail 8.11.2
Sendmail Sendmail 8.12.2
Sendmail Sendmail 8.12.3
Sendmail Sendmail 8.12
1 EDB exploit
NA
CVE-2003-0213
ctrlpacket.c in PoPToP PPTP server prior to 1.1.4-b3 allows remote malicious users to cause a denial of service via a length field of 0 or 1, which causes a negative value to be fed into a read operation, leading to a buffer overflow.
Poptop Pptp Server 1.0.1
Poptop Pptp Server 1.1.2
Poptop Pptp Server 1.1.3
Poptop Pptp Server 1.1.3 2002-10-09
Poptop Pptp Server 1.1.4b1
Poptop Pptp Server 1.1.4b2
5 EDB exploits
NA
CVE-2003-0144
Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 up to and including 7.3, OpenBSD 3.2 and previous versions, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) use...
Lprold Lprold 3.0.48
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.2
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Bsd Lpr 0.48
Bsd Lpr 2000-05-07
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
2 EDB exploits
NA
CVE-2003-0028
Integer overflow in the xdrmem_getbytes() function, and possibly other functions, of XDR (external data representation) libraries derived from SunRPC, including libnsl, libc, glibc, and dietlibc, allows remote malicious users to execute arbitrary code via certain integer values i...
Gnu Glibc 2.1.1
Gnu Glibc 2.1.2
Gnu Glibc 2.3
Gnu Glibc 2.3.1
Mit Kerberos 5 1.2.5
Mit Kerberos 5 1.2.6
Openafs Openafs 1.0.4a
Openafs Openafs 1.1
Openafs Openafs 1.2.3
Openafs Openafs 1.2.4
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.12f
Sgi Irix 6.5.12m
Sgi Irix 6.5.13
Sgi Irix 6.5.15f
Sgi Irix 6.5.15m
Sgi Irix 6.5.18
Sgi Irix 6.5.18f
Gnu Glibc 2.1.3
Gnu Glibc 2.2
Gnu Glibc 2.2.1
NA
CVE-2002-2180
The setitimer(2) system call in OpenBSD 2.0 up to and including 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 2.1
Openbsd Openbsd 2.3
Openbsd Openbsd 3.0
NA
CVE-2002-2222
isakmpd/message.c in isakmpd in FreeBSD before isakmpd-20020403_1, and in OpenBSD 3.1, allows remote malicious users to cause a denial of service (crash) by sending Internet Key Exchange (IKE) payloads out of sequence.
Freebsd Ports Collection
Openbsd Openbsd 3.1
NA
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
NA
CVE-2002-1345
Directory traversal vulnerabilities in multiple FTP clients on UNIX systems allow remote malicious FTP servers to create or overwrite files as the client user via filenames containing /absolute/path or .. (dot dot) sequences.
Ncftp Software Ncftp 3.0.3
Ncftp Software Ncftp 3.0.4
Ncftp Software Ncftp 3.1.0
Ncftp Software Ncftp 3.0.0
Ncftp Software Ncftp 3.1.3
Ncftp Software Ncftp 3.1.4
Ncftp Software Ncftp 3.1.1
Ncftp Software Ncftp 3.1.2
Ncftp Software Ncftp 3.0.1
Ncftp Software Ncftp 3.0.2
Sun Solaris 2.6
Sun Sunos -
Sun Sunos 5.7
Sun Solaris 7.0
Openbsd Openbsd 3.0
NA
CVE-2002-0414
KAME-derived implementations of IPsec on NetBSD 1.5.2, FreeBSD 4.5, and other operating systems, does not properly consult the Security Policy Database (SPD), which could cause a Security Gateway (SG) that does not use Encapsulating Security Payload (ESP) to forward forged IPv4 p...
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.6
Freebsd Freebsd 4.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.3
Freebsd Freebsd 4.5
Openbsd Openbsd 2.7
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-32976
CVE-2024-33557
CVE-2024-36801
CVE-2024-35654
authentication bypass
CVE-2024-24919
CSRF
code execution
CVE-2024-27348
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »