Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd - vulnerabilities and exploits
(subscribe to this query)
4.9
CVSSv2
CVE-2016-6245
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (kernel panic) via a large size in a getdents system call.
Openbsd Openbsd 5.9
Openbsd Openbsd 5.8
4.9
CVSSv2
CVE-2016-6246
OpenBSD 5.8 and 5.9 allows certain local users with kern.usermount privileges to cause a denial of service (kernel panic) by mounting a tmpfs with a VNOVAL in the (1) username, (2) groupname, or (3) device name of the root node.
Openbsd Openbsd 5.9
Openbsd Openbsd 5.8
4.9
CVSSv2
CVE-2016-6350
OpenBSD 5.8 and 5.9 allows local users to cause a denial of service (NULL pointer dereference and panic) via a sysctl call with a path starting with 10,9.
Openbsd Openbsd 5.9
Openbsd Openbsd 5.8
10
CVSSv2
CVE-2001-0053
One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote malicious users to gain root privileges.
David Madore Ftpd-bsd 0.2.3
Openbsd Openbsd 2.8
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.7
Openbsd Openbsd 2.4
Netbsd Netbsd 1.4
Openbsd Openbsd 2.6
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.5
2 EDB exploits
7.5
CVSSv2
CVE-2001-1459
OpenSSH 2.9 and previous versions does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
Openbsd Openssh 2.1.1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.2
Openbsd Openssh 2.1
Openbsd Openssh 2.9
Openbsd Openssh 2.5.2
Openbsd Openssh 2.3
Openbsd Openssh 2.5
5.8
CVSSv2
CVE-2014-2653
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and previous versions allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
Openbsd Openssh
Openbsd Openssh 6.0
Openbsd Openssh 6.3
Openbsd Openssh 6.1
Openbsd Openssh 6.4
Openbsd Openssh 6.5
Openbsd Openssh 6.2
NA
CVE-2023-29323
ascii_load_sockaddr in smtpd in OpenBSD prior to 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable prior to 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.
Openbsd Openbsd 7.2
Opensmtpd Opensmtpd
Openbsd Openbsd 7.1
7.5
CVSSv2
CVE-2000-0750
Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote malicious users to execute arbitrary commands via a long file name.
Redhat Linux 6.1
Redhat Linux 6.2
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.7
Openbsd Openbsd 2.4
Redhat Linux 6.0
Openbsd Openbsd 2.6
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.5
7.5
CVSSv2
CVE-2000-0751
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote malicious users to execute arbitrary commands.
Redhat Linux 6.1
Redhat Linux 6.2
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.7
Openbsd Openbsd 2.4
Redhat Linux 6.0
Openbsd Openbsd 2.6
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.5
1 EDB exploit
5
CVSSv2
CVE-1999-0305
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and previous versions, and FreeBSD 2.2.5 and previous versions, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, whic...
Freebsd Freebsd 2.2.5
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 2.0
Freebsd Freebsd 2.2
Bsdi Bsd Os
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-30065
CVE-2024-5843
CVE-2024-30080
code execution
CVE-2024-4577
CVE-2024-26169
wireless
remote code execution
CVE-2024-36103
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »