Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 3.2 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2002-2188
OpenBSD prior to 3.2 allows local users to cause a denial of service (kernel crash) via a call to getrlimit(2) with invalid arguments, possibly due to an integer signedness error.
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
NA
CVE-2002-1219
Buffer overflow in named in BIND 4 versions 4.9.10 and previous versions, and 8 versions 8.3.3 and previous versions, allows remote malicious users to execute arbitrary code via a certain DNS server response containing SIG resource records (RR).
Isc Bind 4.9.6
Isc Bind 4.9.7
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 4.9.8
Isc Bind 4.9.9
Isc Bind 8.2.6
Isc Bind 8.3.0
Isc Bind 8.2
Isc Bind 8.2.1
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 8.3.3
Isc Bind 4.9.10
Isc Bind 4.9.5
Isc Bind 8.2.2
Isc Bind 8.2.3
Freebsd Freebsd 4.5
Freebsd Freebsd 4.7
Openbsd Openbsd 3.0
Freebsd Freebsd 4.6
Openbsd Openbsd 3.1
NA
CVE-2002-1220
BIND 8.3.x up to and including 8.3.3 allows remote malicious users to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.
Isc Bind 8.3.3
Isc Bind 8.3.1
Isc Bind 8.3.2
Isc Bind 8.3.0
Openbsd Openbsd 3.2
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
1 EDB exploit
NA
CVE-2002-1221
BIND 8.x up to and including 8.3.3 allows remote malicious users to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.
Isc Bind 8.1
Isc Bind 8.2.4
Isc Bind 8.2.5
Isc Bind 8.2.2
Isc Bind 8.2.3
Isc Bind 8.3.3
Isc Bind 8.1.1
Isc Bind 8.1.2
Isc Bind 8.2.6
Isc Bind 8.3.0
Isc Bind 8.2
Isc Bind 8.2.1
Isc Bind 8.3.1
Isc Bind 8.3.2
Freebsd Freebsd 4.4
Freebsd Freebsd 4.5
Openbsd Openbsd 3.2
Freebsd Freebsd 4.6
Freebsd Freebsd 4.7
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
NA
CVE-2002-0640
Buffer overflow in sshd in OpenSSH 2.3.1 up to and including 3.3 may allow remote malicious users to execute arbitrary code via a large number of responses during challenge response authentication when OpenBSD is using PAM modules with interactive keyboard authentication (PAMAuth...
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Openbsd Openssh 2.9p2
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
Openbsd Openssh 3.2
Openbsd Openssh 1.2.2
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 3.0.2
Openbsd Openssh 3.0.2p1
Openbsd Openssh 3.3
Openbsd Openssh 3.3p1
Openbsd Openssh 1.2.3
Openbsd Openssh 2.1
2 EDB exploits
NA
CVE-2002-0575
Buffer overflow in OpenSSH prior to 2.9.9, and 3.x prior to 3.2.1, with Kerberos/AFS support and KerberosTgtPassing or AFSTokenPassing enabled, allows remote and local authenticated users to gain privileges.
Openbsd Openssh 2.1
Openbsd Openssh 2.1.1
Openbsd Openssh 2.9p1
Openbsd Openssh 2.9p2
Openbsd Openssh 2.2
Openbsd Openssh 2.3
Openbsd Openssh 3.0
Openbsd Openssh 3.0.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.9
Openbsd Openssh 2.9.9
Openbsd Openssh 3.2
Openbsd Openssh 2.5
Openbsd Openssh 2.5.1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.1
1 EDB exploit
NA
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
NA
CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote malicious users to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3.
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Sgi Irix 6.5.3
Sgi Irix 6.5.3f
Sgi Irix 6.5.1
Sgi Irix 6.5.10
Sgi Irix 6.5.5
Sgi Irix 6.5.6
Mit Kerberos 5 1.1.1
Sgi Irix 6.1
Sgi Irix 6.5.3m
Sgi Irix 6.5.4
Mit Kerberos 5 1.2
Sgi Irix 6.5.11
Sgi Irix 6.5.2m
Sgi Irix 6.5.7
Sgi Irix 6.5.8
Freebsd Freebsd 2.2
Freebsd Freebsd 3.1
Freebsd Freebsd 2.2.5
Freebsd Freebsd 2.2.6
Freebsd Freebsd 3.5
3 EDB exploits
NA
CVE-2000-0993
Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd.
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Freebsd Freebsd 4.0
Netbsd Netbsd 1.4
Openbsd Openbsd 2.7
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
1 EDB exploit
NA
CVE-2000-0489
FreeBSD, NetBSD, and OpenBSD allow an malicious user to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers.
Netbsd Netbsd 1.4
Freebsd Freebsd 3.1
Netbsd Netbsd 1.4.2
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.7
Freebsd Freebsd 3.0
Freebsd Freebsd 3.2
Freebsd Freebsd 3.3
Freebsd Freebsd 4.0
Freebsd Freebsd 3.4
Freebsd Freebsd 3.5
Freebsd Freebsd 5.0
Openbsd Openbsd 2.6
Openbsd Openbsd 2.5
1 EDB exploit
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
inject
CVE-2024-34001
CVE-2024-37018
LFI
CVE-2024-1275
CVE-2024-1086
CSRF
CVE-2024-31030
CVE-2024-24919
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
4
5
6
NEXT »