Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 2.0 vulnerabilities and exploits
(subscribe to this query)
605
VMScore
CVE-2002-2180
The setitimer(2) system call in OpenBSD 2.0 up to and including 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 2.1
Openbsd Openbsd 2.3
Openbsd Openbsd 3.0
505
VMScore
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Interactive Voice Response
Cisco Ip Contact Center Enterprise
Cisco Personal Assistant 1.4\\(2\\)
Cisco Emergency Responder 1.1
Cisco Intelligent Contact Manager 5.0
Cisco Personal Assistant 1.3\\(3\\)
Cisco Personal Assistant 1.3\\(4\\)
Cisco Personal Assistant 1.4\\(1\\)
Cisco Secure Access Control Server 2.3
Cisco Secure Access Control Server 2.6
Cisco Secure Access Control Server 3.0
Cisco Secure Access Control Server 3.2\\(1.20\\)
Cisco Secure Access Control Server 3.2\\(2\\)
Cisco Agent Desktop
Cisco E-mail Manager
Cisco Personal Assistant 1.3\\(1\\)
Cisco Personal Assistant 1.3\\(2\\)
Cisco Secure Access Control Server 2.3.5.1
Cisco Secure Access Control Server 2.3.6.1
Cisco Secure Access Control Server 2.6.3
Cisco Secure Access Control Server 2.6.4
Cisco Secure Access Control Server 3.1.1
1 EDB exploit
505
VMScore
CVE-2000-0914
OpenBSD 2.6 and previous versions allows remote malicious users to cause a denial of service by flooding the server with ARP requests.
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
1 EDB exploit
454
VMScore
CVE-2000-0217
The default configuration of SSH allows X forwarding, which could allow a remote malicious user to control a client's X sessions via a malicious xauth program.
Ssh Ssh 1.2.11
Ssh Ssh 1.2.12
Ssh Ssh 1.2.13
Ssh Ssh 1.2.14
Ssh Ssh 1.2.15
Ssh Ssh 1.2.27
Ssh Ssh 1.2.28
Ssh Ssh 1.2.29
Ssh Ssh 1.2.3
Ssh Ssh2 2.0.2
Ssh Ssh2 2.0.3
Ssh Ssh2 2.0.4
Ssh Ssh2 2.0.5
Ssh Ssh 1.2.2
Ssh Ssh 1.2.20
Ssh Ssh 1.2.21
Ssh Ssh 1.2.22
Ssh Ssh 1.2.7
Ssh Ssh 1.2.8
Ssh Ssh 1.2.9
Ssh Ssh2 2.0
Ssh Ssh 1.2.0
446
VMScore
CVE-1999-0001
ip_input.c in BSD-derived TCP/IP implementations allows remote malicious users to cause a denial of service (crash or hang) via crafted packets.
Freebsd Freebsd 1.0
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.8
Openbsd Openbsd 2.3
Bsdi Bsd Os 3.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.0.1
Freebsd Freebsd 1.1
Freebsd Freebsd 1.2
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 3.0
3 Github repositories
445
VMScore
CVE-2014-7250
The TCP stack in 4.3BSD Net/2, as used in FreeBSD 5.4, NetBSD possibly 2.0, and OpenBSD possibly 3.6, does not properly implement the session timer, which allows remote malicious users to cause a denial of service (resource consumption) via crafted packets.
Openbsd Openbsd 3.6
Netbsd Netbsd 2.0
Freebsd Freebsd 5.4
Bsd Bsd 4.3
445
VMScore
CVE-2011-2168
Multiple integer overflows in the glob implementation in libc in OpenBSD prior to 4.9 might allow context-dependent malicious users to have an unspecified impact via a crafted string, related to the GLOB_APPEND and GLOB_DOOFFS flags, a different issue than CVE-2011-0418.
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd 4.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 4.7
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 4.5
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
1 Github repository
445
VMScore
CVE-2005-0740
The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote malicious users to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.3
Openbsd Openbsd 2.5
Openbsd Openbsd 3.0
Openbsd Openbsd 3.2
445
VMScore
CVE-2004-0079
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote malicious users to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Cisco Firewall Services Module
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1.2
Hp Aaa Server
Cisco Firewall Services Module 1.1 \\(3.005\\)
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Avaya Sg203 4.4
Hp Hp-ux 11.11
Redhat Enterprise Linux Desktop 3.0
Hp Hp-ux 11.23
Cisco Ciscoworks Common Management Foundation 2.1
Freebsd Freebsd 5.1
Avaya Sg208 4.4
Redhat Enterprise Linux 3.0
Avaya Sg200 4.4
Avaya Sg5 4.4
Redhat Linux 7.2
Cisco Ciscoworks Common Services 2.2
Openbsd Openbsd 3.3
445
VMScore
CVE-2004-0081
OpenSSL 0.9.6 prior to 0.9.6d does not properly handle unknown message types, which allows remote malicious users to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
Cisco Firewall Services Module 1.1.3
Cisco Firewall Services Module 1.1 \\(3.005\\)
Cisco Firewall Services Module
Cisco Firewall Services Module 1.1.2
Symantec Clientless Vpn Gateway 4400 5.0
Hp Apache-based Web Server 2.0.43.00
Hp Apache-based Web Server 2.0.43.04
Cisco Firewall Services Module 2.1 \\(0.208\\)
Hp Aaa Server
Cisco Ciscoworks Common Management Foundation 2.1
Cisco Ciscoworks Common Services 2.2
Avaya Sg208 4.4
Avaya Sg5 4.2
Avaya Sg5 4.3
Freebsd Freebsd 5.1
Hp Hp-ux 8.05
Openbsd Openbsd 3.3
Redhat Linux 8.0
Sco Openserver 5.0.6
Avaya Sg203 4.4
Avaya Sg208
Freebsd Freebsd 4.8
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
NEXT »