Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 3.6 vulnerabilities and exploits
(subscribe to this query)
1000
VMScore
CVE-2007-1365
Buffer overflow in kern/uipc_mbuf2.c in OpenBSD 3.9 and 4.0 allows remote malicious users to execute arbitrary code via fragmented IPv6 packets due to "incorrect mbuf handling for ICMP6 packets." NOTE: this was originally reported as a denial of service.
Openbsd Openbsd 4.0
Openbsd Openbsd 3.9
1 EDB exploit
1000
VMScore
CVE-2001-0554
Buffer overflow in BSD-based telnetd telnet daemon on various operating systems allows remote malicious users to execute arbitrary commands via a set of options including AYT (Are You There), which is not properly handled by the telrcv function.
Netkit Linux Netkit 0.10
Netkit Linux Netkit 0.11
Mit Kerberos 1.0
Netkit Linux Netkit 0.12
Sgi Irix 6.5
Mit Kerberos 5 1.2
Mit Kerberos 5 1.2.1
Mit Kerberos 5 1.2.2
Mit Kerberos 5 1.1
Mit Kerberos 5 1.1.1
Freebsd Freebsd 2.0
Freebsd Freebsd 2.0.1
Freebsd Freebsd 2.0.5
Freebsd Freebsd 2.1
Freebsd Freebsd 2.1.0
Freebsd Freebsd 2.1.5
Freebsd Freebsd 2.1.6
Freebsd Freebsd 2.1.6.1
Freebsd Freebsd 2.1.7
Freebsd Freebsd 2.1.7.1
Freebsd Freebsd 2.2
Freebsd Freebsd 2.2.1
1 EDB exploit
828
VMScore
CVE-2011-2895
The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont prior to 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD prior to 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x prior to 5.0.3 and 5.1.x prior to 5.1.1, FreeTyp...
Openbsd Openbsd 3.5
Openbsd Openbsd 3.4
Openbsd Openbsd 3.3
Openbsd Openbsd 2.6
Openbsd Openbsd 2.0
Freebsd Freebsd
Netbsd Netbsd
Openbsd Openbsd 3.0
Openbsd Openbsd 2.9
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
X Libxfont 1.2.0
X Libxfont 1.2.1
X Libxfont 1.2.9
X Libxfont 1.3.0
X Libxfont 1.4.2
Openbsd Openbsd 3.6
Openbsd Openbsd 2.8
Openbsd Openbsd 2.7
Openbsd Openbsd 2.5
Openbsd Openbsd
X Libxfont 1.2.2
785
VMScore
CVE-2006-4924
sshd in OpenSSH prior to 4.4, when using the version 1 SSH protocol, allows remote malicious users to cause a denial of service (CPU consumption) via an SSH packet that contains duplicate blocks, which is not properly handled by the CRC compensation attack detector.
Openbsd Openssh 1.2.1
Openbsd Openssh 1.2.2
Openbsd Openssh 1.2.27
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 3.0.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 3.2.2
Openbsd Openssh 3.2.2p1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.6
Openbsd Openssh 3.6.1
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1
Openbsd Openssh 4.2
Openbsd Openssh 4.2p1
Openbsd Openssh 1.2
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 2.9p2
Openbsd Openssh 3.0
Openbsd Openssh 3.1p1
1 EDB exploit
676
VMScore
CVE-2003-1562
sshd in OpenSSH 3.6.1p2 and previous versions, when PermitRootLogin is disabled and using PAM keyboard-interactive authentication, does not insert a delay after a root login attempt with the correct password, which makes it easier for remote malicious users to use timing differen...
Openbsd Openssh 2
Openbsd Openssh 3.2.2
Openbsd Openssh 3.1
Openbsd Openssh 3.0.2p1
Openbsd Openssh 1.5.8
Openbsd Openssh 2.1.1
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.0
Openbsd Openssh 1.2.1
Openbsd Openssh 2.2
Openbsd Openssh 3.2
Openbsd Openssh 3.6
Openbsd Openssh 1.5.7
Openbsd Openssh 1.2.3
Openbsd Openssh 3.5p1
Openbsd Openssh 2.3.1
Openbsd Openssh 3.0.1p1
Openbsd Openssh 2.1
670
VMScore
CVE-2010-4478
OpenSSH 5.6 and previous versions, when J-PAKE is enabled, does not properly validate the public parameters in the J-PAKE protocol, which allows remote malicious users to bypass the need for knowledge of the shared secret, and successfully authenticate, by sending crafted values ...
Openbsd Openssh 5.4
Openbsd Openssh 3.8
Openbsd Openssh 3.8.1p1
Openbsd Openssh 4.3p2
Openbsd Openssh 3.2.2
Openbsd Openssh 3.1
Openbsd Openssh 5.5
Openbsd Openssh 3.0.2p1
Openbsd Openssh 1.5.8
Openbsd Openssh 5.3
Openbsd Openssh 4.1
Openbsd Openssh 3.8.1
Openbsd Openssh 2.1.1
Openbsd Openssh 3.7.1p2
Openbsd Openssh 4.8
Openbsd Openssh 4.9
Openbsd Openssh 3.2.3p1
Openbsd Openssh 3.1p1
Openbsd Openssh 2.5.1
Openbsd Openssh 2.9.9p2
Openbsd Openssh 3.6.1p2
Openbsd Openssh 3.9
8 Github repositories
632
VMScore
CVE-2008-4609
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote malicious users to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate info...
Cisco Ios 12.0\\(16\\)sc3
Cisco Ios 12.2\\(3.4\\)bp
Cisco Ios 11.2xa
Cisco Ios 12.4\\(2\\)t2
Cisco Ios 12.3ym
Cisco Ios 11.3\\(11b\\)
Linux Linux Kernel 2.3.19
Cisco Ios 12.0\\(21\\)s7
Bsdi Bsd Os 1.1
Cisco Ios 12.1\\(2\\)e1
Cisco Ios 12.1xg
Cisco Ios 12.1\\(19\\)ew
Cisco Ios 12.3\\(14\\)ym4
Cisco Ios 12.0\\(8\\)s1
Linux Linux Kernel 2.6.20.6
Linux Linux Kernel 2.3.31
Cisco Ios 12.2\\(7b\\)
Linux Linux Kernel 2.0.30
Cisco Ios 12.0xc
Cisco Ios 12.3yq
Cisco Ios 10.0
Cisco Ios 12.3\\(10\\)
1 Github repository
505
VMScore
CVE-2005-0356
Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote malicious users to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard late...
Cisco Interactive Voice Response
Cisco Ip Contact Center Enterprise
Cisco Personal Assistant 1.4\\(2\\)
Cisco Emergency Responder 1.1
Cisco Intelligent Contact Manager 5.0
Cisco Personal Assistant 1.3\\(3\\)
Cisco Personal Assistant 1.3\\(4\\)
Cisco Personal Assistant 1.4\\(1\\)
Cisco Secure Access Control Server 2.3
Cisco Secure Access Control Server 2.6
Cisco Secure Access Control Server 3.0
Cisco Secure Access Control Server 3.2\\(1.20\\)
Cisco Secure Access Control Server 3.2\\(2\\)
Cisco Agent Desktop
Cisco E-mail Manager
Cisco Personal Assistant 1.3\\(1\\)
Cisco Personal Assistant 1.3\\(2\\)
Cisco Secure Access Control Server 2.3.5.1
Cisco Secure Access Control Server 2.3.6.1
Cisco Secure Access Control Server 2.6.3
Cisco Secure Access Control Server 2.6.4
Cisco Secure Access Control Server 3.1.1
1 EDB exploit
454
VMScore
CVE-2002-2222
isakmpd/message.c in isakmpd in FreeBSD before isakmpd-20020403_1, and in OpenBSD 3.1, allows remote malicious users to cause a denial of service (crash) by sending Internet Key Exchange (IKE) payloads out of sequence.
Freebsd Ports Collection
Openbsd Openbsd 3.1
446
VMScore
CVE-2010-5107
The default configuration of OpenSSH up to and including 6.1 enforces a fixed time limit between establishing a TCP connection and completing a login, which makes it easier for remote malicious users to cause a denial of service (connection-slot exhaustion) by periodically making...
Openbsd Openssh
Openbsd Openssh 5.7
Openbsd Openssh 5.1
Openbsd Openssh 4.2p1
Openbsd Openssh 4.1p1
Openbsd Openssh 4.3
Openbsd Openssh 4.4
Openbsd Openssh 3.8.1p1
Openbsd Openssh 3.9
Openbsd Openssh 3.0p1
Openbsd Openssh 3.0.2
Openbsd Openssh 3.5p1
Openbsd Openssh 3.6
Openbsd Openssh 3.2.2
Openbsd Openssh 3.2.2p1
Openbsd Openssh 2.1
Openbsd Openssh 2.9.9
Openbsd Openssh 1.5.7
Openbsd Openssh 1.5.8
Openbsd Openssh 1.2
Openbsd Openssh 5.2
Openbsd Openssh 5.3
2 Github repositories
VMScore
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-4761
command injection
CVE-2024-3676
IDOR
CVE-2024-30039
CVE-2024-32113
CVE-2024-30049
CVE-2024-4776
SQL injection
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
NEXT »