Filter
AND

OpenBSDOpenBSD vmm GDTR limits

7.9
First published (updated )

OpenBSD vixie croncron/entry.c in vixie cron before 9cc8ab1, as used in OpenBSD 7.4 and 7.5, allows a heap-based buffe…

7.3
First published (updated )

OpenBSDOpenBSD 7.4 and 7.3 m_split() network buffer kernel crash

7.5
First published (updated )

OpenBSDOpenBSD 7.3 invalid l2tp message npppd crash

7.5
First published (updated )

OpenBSDascii_load_sockaddr in smtpd in OpenBSD before 7.1 errata 024 and 7.2 before errata 020, and OpenSMT…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

OpenBSDIn OpenBSD 7.2, a TCP packet with destination port 0 that matches a pf divert-to rule can crash the …

7.5
First published (updated )

OpenBSDBuffer Overflow

7.5
First published (updated )

OpenBSDBuffer Overflow

7.5
First published (updated )

OpenBSDNull Pointer Dereference

7.5
First published (updated )

FreeBSD FreeBSDregcomp in the BSD implementation of libc is vulnerable to denial of service due to stack exhaustion…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

OpenBSDOpenBSD through 6.6 allows local users to escalate to root because a check for LD_LIBRARY_PATH in se…

7.8
First published (updated )

iPadOSKernel. A routing issue was addressed with improved restrictions.

7.4
First published (updated )

OpenBSDIn OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding roo…

7.8
First published (updated )

OpenBSDxlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBG…

7.8
First published (updated )

OpenBSDOpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows…

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Siemens Scalance M812-1 ADSL RouterOpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very…

7.5
First published (updated )

Barracuda VPN ClientThe barracudavpn component of the Barracuda VPN Client prior to version 5.0.2.7 for Linux, macOS, an…

7.8
First published (updated )

OpenBSDhttpd in OpenBSD allows remote attackers to cause a denial of service (memory consumption) via a ser…

7.8
First published (updated )

OpenBSDInteger truncation error in the amap_alloc function in OpenBSD 5.8 and 5.9 allows local users to exe…

7.8
First published (updated )

OpenBSDInteger Overflow

7.8
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

OpenBSDInput Validation

7.8
First published (updated )

debian/linux-2.6Last updated 24 July 2024

7.2
First published (updated )

OpenBSDNull Pointer Dereference

7.8
First published (updated )

Cisco IOSThe TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cis…

7.1
First published (updated )

NetBSD NetBSDCSRF

7.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

OpenBSDThe tcp_respond function in netinet/tcp_subr.c in OpenBSD 4.1 and 4.2 allows attackers to cause a de…

7.8
First published (updated )

OpenBSDThe ip6_check_rh0hdr function in netinet6/ip6_input.c in OpenBSD 4.2 allows attackers to cause a den…

7.8
First published (updated )

SolarisBuffer Overflow

7.2
First published (updated )

IETF IPv6The IPv6 protocol allows remote attackers to cause a denial of service via crafted IPv6 type 0 route…

7.8
First published (updated )

Red Hat Enterprise LinuxInteger Overflow

8.5
First published (updated )

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203