Vulnerabilities > Openbsd > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-03-13 | CVE-2021-36368 | Improper Authentication vulnerability in multiple products An issue was discovered in OpenSSH before 8.9. | 3.7 |
2021-05-11 | CVE-2020-26142 | Injection vulnerability in Openbsd 6.6 An issue was discovered in the kernel in OpenBSD 6.6. | 2.6 |
2018-06-15 | CVE-2018-12434 | Information Exposure vulnerability in Openbsd Libressl LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. | 1.9 |
2017-04-27 | CVE-2017-8301 | Improper Certificate Validation vulnerability in Openbsd Libressl 2.5.1/2.5.2/2.5.3 LibreSSL 2.5.1 to 2.5.3 lacks TLS certificate verification if SSL_get_verify_result is relied upon for a later check of a verification result, in a use case where a user-provided verification callback returns 1, as demonstrated by acceptance of invalid certificates by nginx. | 2.6 |
2014-02-03 | CVE-2011-4327 | Information Exposure vulnerability in Openbsd Openssh ssh-keysign.c in ssh-keysign in OpenSSH before 5.8p2 on certain platforms executes ssh-rand-helper with unintended open file descriptors, which allows local users to obtain sensitive key information via the ptrace system call. | 2.1 |
2012-04-05 | CVE-2011-5000 | Numeric Errors vulnerability in Openbsd Openssh The ssh_gssapi_parse_ename function in gss-serv.c in OpenSSH 5.8 and earlier, when gssapi-with-mic authentication is enabled, allows remote authenticated users to cause a denial of service (memory consumption) via a large value in a certain length field. | 3.5 |
2008-11-19 | CVE-2008-5161 | Information Exposure vulnerability in multiple products Error handling in the SSH protocol in (1) SSH Tectia Client and Server and Connector 4.0 through 4.4.11, 5.0 through 5.2.4, and 5.3 through 5.3.8; Client and Server and ConnectSecure 6.0 through 6.0.4; Server for Linux on IBM System z 6.0.4; Server for IBM z/OS 5.5.1 and earlier, 6.0.0, and 6.0.1; and Client 4.0-J through 4.3.3-J and 4.0-K through 4.3.10-K; and (2) OpenSSH 4.7p1 and possibly other versions, when using a block cipher algorithm in Cipher Block Chaining (CBC) mode, makes it easier for remote attackers to recover certain plaintext data from an arbitrary block of ciphertext in an SSH session via unknown vectors. | 2.6 |
2008-07-22 | CVE-2008-3259 | Information Exposure vulnerability in Openbsd Openssh OpenSSH before 5.1 sets the SO_REUSEADDR socket option when the X11UseLocalhost configuration setting is disabled, which allows local users on some platforms to hijack the X11 forwarding port via a bind to a single IP address, as demonstrated on the HP-UX platform. | 1.2 |
2007-04-06 | CVE-2007-1352 | Local Integer Overflow vulnerability in X.Org LibXFont Integer overflow in the FontFileInitTable function in X.Org libXfont before 20070403 allows remote authenticated users to execute arbitrary code via a long first line in the fonts.dir file, which results in a heap overflow. | 3.8 |
2006-10-10 | CVE-2006-5229 | Information Exposure vulnerability in Openbsd Openssh 4.1 OpenSSH portable 4.1 on SUSE Linux, and possibly other platforms and versions, and possibly under limited configurations, allows remote attackers to determine valid usernames via timing discrepancies in which responses take longer for valid usernames than invalid ones, as demonstrated by sshtime. | 2.6 |