Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 3.4 vulnerabilities and exploits
(subscribe to this query)
7.5
CVSSv2
CVE-2004-2338
OpenBSD 3.3 and 3.4 does not properly parse Accept and Deny rules without netmasks on big-endian 64-bit platforms such as SPARC64, which may allow remote malicious users to bypass access restrictions.
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
4.6
CVSSv2
CVE-2003-0955
OpenBSD kernel 3.3 and 3.4 allows local users to cause a denial of service (kernel panic) and possibly execute arbitrary code in 3.4 via a program with an invalid header that is not properly handled by (1) ibcs2_exec.c in the iBCS2 emulation (compat_ibcs2) or (2) exec_elf.c, whic...
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
2 EDB exploits
4.6
CVSSv2
CVE-2004-0482
Multiple integer overflows in (1) procfs_cmdline.c, (2) procfs_fpregs.c, (3) procfs_linux.c, (4) procfs_regs.c, (5) procfs_status.c, and (6) procfs_subr.c in procfs for OpenBSD 3.5 and previous versions allow local users to read sensitive kernel memory and possibly perform other ...
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
2.1
CVSSv2
CVE-2004-2230
Heap-based buffer overflow in isakmpd on OpenBSD 3.4 up to and including 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket.
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
7.5
CVSSv2
CVE-2004-2163
login_radius on OpenBSD 3.2, 3.5, and possibly other versions does not verify the shared secret in a response packet from a RADIUS server, which allows remote malicious users to bypass authentication by spoofing server replies.
Openbsd Openbsd 3.2
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
5
CVSSv2
CVE-2004-0819
The bridge functionality in OpenBSD 3.4 and 3.5, when running a gateway configured as a bridging firewall with the link2 option for IPSec enabled, allows remote malicious users to cause a denial of service (crash) via an ICMP echo (ping) packet.
Openbsd Openbsd 3.2
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
7.5
CVSSv2
CVE-2004-1799
PF in certain OpenBSD versions, when stateful filtering is enabled, does not limit packets for a session to the original interface, which allows remote malicious users to bypass intended packet filters via spoofed packets to other interfaces.
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
5
CVSSv2
CVE-2004-0257
OpenBSD 3.4 and NetBSD 1.6 and 1.6.1 allow remote malicious users to cause a denial of service (crash) by sending an IPv6 packet with a small MTU to a listening port and then issuing a TCP connect to that port.
Netbsd Netbsd 1.6
Netbsd Netbsd 1.6.1
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 3.3
Openbsd Openbsd 3.4
6.2
CVSSv2
CVE-2000-0092
The BSD make program allows local users to modify files via a symlink attack when the -j option is being used.
Freebsd Freebsd 3.4
Netbsd Netbsd 1.4.1
Openbsd Openbsd 2.6
5
CVSSv2
CVE-2005-0740
The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote malicious users to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
Openbsd Openbsd 3.1
Preferred Score:
CVSSv2
CVSSv2
CVSSv3
CVSSv4
EPSS
VMScore
Recommendations:
CVE-2024-10401
validation
CVE-2025-0483
CVE-2024-10789
deserialization
CVE-2025-21333
wireless
CVE-2024-13387
CVE-2025-21334
Home
/
Search Results
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »