Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 2.0 vulnerabilities and exploits
(subscribe to this query)
5
CVSSv2
CVE-2000-0914
OpenBSD 2.6 and previous versions allows remote malicious users to cause a denial of service by flooding the server with ARP requests.
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
1 EDB exploit
5
CVSSv2
CVE-1999-0001
ip_input.c in BSD-derived TCP/IP implementations allows remote malicious users to cause a denial of service (crash or hang) via crafted packets.
Freebsd Freebsd 1.0
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.8
Openbsd Openbsd 2.3
Bsdi Bsd Os 3.1
Freebsd Freebsd 2.2.3
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.0.1
Freebsd Freebsd 1.1
Freebsd Freebsd 1.2
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 3.0
3 Github repositories
5
CVSSv2
CVE-1999-0052
IP fragmentation denial of service in FreeBSD allows a remote malicious user to cause a crash.
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1.0
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Bsdi Bsd Os 4.0
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2.2
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 1.1.5.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.8
Openbsd Openbsd 2.2
5
CVSSv2
CVE-1999-0305
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and previous versions, and FreeBSD 2.2.5 and previous versions, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, whic...
Bsdi Bsd Os
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.5
Openbsd Openbsd 2.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
4.9
CVSSv2
CVE-2009-0537
Integer overflow in the fts_build function in fts.c in libc in (1) OpenBSD 4.4 and previous versions and (2) Microsoft Interix 6.0 build 10.0.6030.0 allows context-dependent malicious users to cause a denial of service (application crash) via a deep directory tree, related to the...
Openbsd Openbsd 4.1
Openbsd Openbsd 3.7
Openbsd Openbsd 2.8
Openbsd Openbsd 3.8
Openbsd Openbsd
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 3.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Openbsd Openbsd 3.2
Openbsd Openbsd 2.4
Openbsd Openbsd 4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 3.0
Openbsd Openbsd 4.0
Openbsd Openbsd 3.5
Microsoft Interix 6.0
Openbsd Openbsd 2.6
4.6
CVSSv2
CVE-2006-0145
The kernfs_xread function in kernfs in NetBSD 1.6 up to and including 2.1, and OpenBSD 3.8, does not properly validate file offsets against negative 32-bit values that occur as a result of truncation, which allows local users to read arbitrary kernel memory and gain privileges vi...
Netbsd Netbsd 2.0.2
Netbsd Netbsd 2.0.3
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.1
Netbsd Netbsd 2.1
Netbsd Netbsd 2.0
Netbsd Netbsd 2.0.1
Netbsd Netbsd 1.6.2
3.8
CVSSv2
CVE-2007-1352
Integer overflow in the FontFileInitTable function in X.Org libXfont prior to 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow.
Mandrakesoft Mandrake Multi Network Firewall 2.0
X.org Libxfont 1.2.2
Redhat Enterprise Linux 2.1
Redhat Enterprise Linux 3.0
Redhat Enterprise Linux 4.0
Redhat Fedora Core Core 1.0
Redhat Linux 9.0
Redhat Enterprise Linux Desktop 5.0
Redhat Linux Advanced Workstation 2.1
Redhat Enterprise Linux Desktop 3.0
Redhat Enterprise Linux Desktop 4.0
Slackware Slackware Linux Current
Slackware Slackware Linux 9.0
Slackware Slackware Linux 9.1
Turbolinux Turbolinux Desktop 10.0
Ubuntu Ubuntu Linux 5.10
Ubuntu Ubuntu Linux 6.06 Lts
Ubuntu Ubuntu Linux 6.10
Ubuntu Ubuntu Linux 4.1
Rpath Linux 1
Openbsd Openbsd 3.9
Openbsd Openbsd 4.0
3.7
CVSSv2
CVE-2002-2092
Race condition in exec in OpenBSD 4.0 and previous versions, NetBSD 1.5.2 and previous versions, and FreeBSD 4.4 and previous versions allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid.
Freebsd Freebsd 2.0
Freebsd Freebsd 2.2.6
Freebsd Freebsd 2.2.4
Freebsd Freebsd 2.2.5
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 4.2
Freebsd Freebsd 4.3
Netbsd Netbsd 1.3
Netbsd Netbsd 1.3.1
Netbsd Netbsd 1.5
Netbsd Netbsd 1.5.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Freebsd Freebsd 2.2.8
Freebsd Freebsd 3.5.1
Freebsd Freebsd 4.0
Netbsd Netbsd 1.3.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.5.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.8
3.3
CVSSv2
CVE-2003-1366
chpass in OpenBSD 2.0 up to and including 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information.
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
1 EDB exploit
2.1
CVSSv2
CVE-2002-1915
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
Openbsd Openbsd 2.8
Netbsd Netbsd 1.3
Netbsd Netbsd 1.5
Openbsd Openbsd 3.1
Netbsd Netbsd 1.2.1
Netbsd Netbsd 1.3.1
Openbsd Openbsd 2.9
Openbsd Openbsd 2.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 4.5
Freebsd Freebsd 3.5.1
Openbsd Openbsd 2.2
Netbsd Netbsd 1.3.3
Netbsd Netbsd 1.0
Openbsd Openbsd 2.0
Openbsd Openbsd 2.7
Freebsd Freebsd 4.1
Netbsd Netbsd 1.5.1
Freebsd Freebsd 4.4
Openbsd Openbsd 2.4
Netbsd Netbsd 1.1
Netbsd Netbsd 1.5.2
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2023-30310
CVE-2024-21683
CVE-2024-22187
chrome
deserialization
XPath injection
CVE-2024-27842
denial of service
CVE-2024-24851
google
CVE-2024-35400
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4