Vulmon
Recent Vulnerabilities
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
openbsd openbsd 2.3 vulnerabilities and exploits
(subscribe to this query)
NA
CVE-2000-0994
Format string vulnerability in OpenBSD fstat program (and possibly other BSD-based operating systems) allows local users to gain root privileges via the PWD environmental variable.
Openbsd Openbsd 2.7
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
1 EDB exploit
NA
CVE-2000-1004
Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands via a configuration file directory name that contains formatting characters.
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
NA
CVE-2000-0914
OpenBSD 2.6 and previous versions allows remote malicious users to cause a denial of service by flooding the server with ARP requests.
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.6
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
1 EDB exploit
NA
CVE-1999-0062
The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage.
Openbsd Openbsd 2.3
NA
CVE-2002-2180
The setitimer(2) system call in OpenBSD 2.0 up to and including 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error.
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 2.1
Openbsd Openbsd 2.3
Openbsd Openbsd 3.0
NA
CVE-2003-1366
chpass in OpenBSD 2.0 up to and including 3.2 allows local users to read portions of arbitrary files via a hard link attack on a temporary file used to store user database information.
Openbsd Openbsd 2.2
Openbsd Openbsd 2.3
Openbsd Openbsd 3.1
Openbsd Openbsd 3.2
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 2.9
Openbsd Openbsd 3.0
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
1 EDB exploit
NA
CVE-2000-0997
Format string vulnerabilities in eeprom program in OpenBSD, NetBSD, and possibly other operating systems allows local malicious users to gain root privileges.
Openbsd Openbsd 2.3
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Netbsd Netbsd 1.4
Openbsd Openbsd 2.7
Netbsd Netbsd 1.4.1
Netbsd Netbsd 1.4.2
NA
CVE-2000-1010
Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote malicious users to execute arbitrary commands via a user name that contains format characters.
Openbsd Openbsd 2.4
Openbsd Openbsd 2.5
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Redhat Linux 5.0
Redhat Linux 5.1
Redhat Linux 5.2
Openbsd Openbsd 2.3
NA
CVE-2005-0740
The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote malicious users to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout.
Openbsd Openbsd 2.6
Openbsd Openbsd 2.7
Openbsd Openbsd 2.8
Openbsd Openbsd 2.9
Openbsd Openbsd 2.0
Openbsd Openbsd 2.1
Openbsd Openbsd 3.4
Openbsd Openbsd 3.5
Openbsd Openbsd 3.6
Openbsd Openbsd 2.2
Openbsd Openbsd 2.4
Openbsd Openbsd 3.1
Openbsd Openbsd 3.3
Openbsd Openbsd 2.3
Openbsd Openbsd 2.5
Openbsd Openbsd 3.0
Openbsd Openbsd 3.2
NA
CVE-2001-1459
OpenSSH 2.9 and previous versions does not initiate a Pluggable Authentication Module (PAM) session if commands are executed with no pty, which allows local users to bypass resource limits (rlimits) set in pam.d.
Openbsd Openssh 2.3
Openbsd Openssh 2.5
Openbsd Openssh 2.5.1
Openbsd Openssh 2.5.2
Openbsd Openssh 2.1.1
Openbsd Openssh 2.2
Openbsd Openssh 2.1
Openbsd Openssh 2.9
CVSSv3
CVSSv2
CVSSv3
VMScore
Recommendations:
CVE-2024-33228
CVE-2024-20361
log injection
bypass
CVE-2024-4985
CVE-2024-35223
CVE-2024-29849
CVE-2024-31893
IMAP
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
1
2
3
4
5
NEXT »