Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd vulnerabilities and exploits
(subscribe to this query)
436
VMScore
CVE-2006-4435
OpenBSD 3.8, 3.9, and possibly earlier versions allows context-dependent malicious users to cause a denial of service (kernel panic) by allocating more semaphores than the default.
Openbsd Openbsd 3.8
Openbsd Openbsd 3.9
445
VMScore
CVE-2006-4436
isakmpd in OpenBSD 3.8, 3.9, and possibly earlier versions, creates Security Associations (SA) with a replay window of size 0 when isakmpd acts as a responder during SA negotiation, which allows remote malicious users to replay IPSec packets and bypass the replay protection.
Openbsd Openbsd 3.8
Openbsd Openbsd 3.9
668
VMScore
CVE-2004-2338
OpenBSD 3.3 and 3.4 does not properly parse Accept and Deny rules without netmasks on big-endian 64-bit platforms such as SPARC64, which may allow remote malicious users to bypass access restrictions.
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
1000
VMScore
CVE-2001-0053
One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote malicious users to gain root privileges.
David Madore Ftpd-bsd 0.2.3
Openbsd Openbsd 2.8
Netbsd Netbsd 1.5
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.7
Openbsd Openbsd 2.4
Netbsd Netbsd 1.4
Openbsd Openbsd 2.6
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.5
2 EDB exploits
668
VMScore
CVE-2001-1459
OpenSSH 2.9 and previous versions does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
Openbsd Openssh 2.1.1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.2
Openbsd Openssh 2.1
Openbsd Openssh 2.9
Openbsd Openssh 2.5.2
Openbsd Openssh 2.3
Openbsd Openssh 2.5
516
VMScore
CVE-2014-2653
The verify_host_key function in sshconnect.c in the client in OpenSSH 6.6 and previous versions allows remote servers to trigger the skipping of SSHFP DNS RR checking by presenting an unacceptable HostCertificate.
Openbsd Openssh
Openbsd Openssh 6.0
Openbsd Openssh 6.3
Openbsd Openssh 6.1
Openbsd Openssh 6.4
Openbsd Openssh 6.5
Openbsd Openssh 6.2
NA
CVE-2023-29323
ascii_load_sockaddr in smtpd in OpenBSD prior to 7.1 errata 024 and 7.2 before errata 020, and OpenSMTPD Portable prior to 7.0.0-portable commit f748277, can abort upon a connection from a local, scoped IPv6 address.
Openbsd Openbsd 7.2
Opensmtpd Opensmtpd
Openbsd Openbsd 7.1
755
VMScore
CVE-2000-0751
mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote malicious users to execute arbitrary commands.
Redhat Linux 6.1
Redhat Linux 6.2
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.7
Openbsd Openbsd 2.4
Redhat Linux 6.0
Openbsd Openbsd 2.6
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.5
1 EDB exploit
668
VMScore
CVE-2000-0750
Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote malicious users to execute arbitrary commands via a long file name.
Redhat Linux 6.1
Redhat Linux 6.2
Netbsd Netbsd 1.4.2
Openbsd Openbsd 2.7
Openbsd Openbsd 2.4
Redhat Linux 6.0
Openbsd Openbsd 2.6
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.5
445
VMScore
CVE-1999-0305
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and previous versions, and FreeBSD 2.2.5 and previous versions, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, whic...
Freebsd Freebsd 2.2.5
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 2.0
Freebsd Freebsd 2.2
Bsdi Bsd Os
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-5834
CVE-2024-30100
CVE-2024-4577
physical
dos
CVE-2024-30099
CVE-2024-27801
CVE-2024-32146
logic flaw
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
3
4
5
6
7
8
9
10
NEXT »