Show filters
321 Total Results
Displaying 51-60 of 321
Sort by:
Attacker Value
Unknown
CVE-2019-14899
Disclosure Date: December 11, 2019 (last updated November 27, 2024)
A vulnerability was discovered in Linux, FreeBSD, OpenBSD, MacOS, iOS, and Android that allows a malicious access point, or an adjacent user, to determine if a connected user is using a VPN, make positive inferences about the websites they are visiting, and determine the correct sequence and acknowledgement numbers in use, allowing the bad actor to inject data into the TCP stream. This provides everything that is needed for an attacker to hijack active connections inside the VPN tunnel.
0
Attacker Value
Unknown
CVE-2012-1577
Disclosure Date: December 10, 2019 (last updated November 27, 2024)
lib/libc/stdlib/random.c in OpenBSD returns 0 when seeded with 0.
0
Attacker Value
Unknown
CVE-2019-19520
Disclosure Date: December 05, 2019 (last updated November 27, 2024)
xlock in OpenBSD 6.6 allows local users to gain the privileges of the auth group by providing a LIBGL_DRIVERS_PATH environment variable, because xenocara/lib/mesa/src/loader/loader.c mishandles dlopen.
0
Attacker Value
Unknown
CVE-2019-19521
Disclosure Date: December 05, 2019 (last updated November 27, 2024)
libc in OpenBSD 6.6 allows authentication bypass via the -schallenge username, as demonstrated by smtpd, ldapd, or radiusd. This is related to gen/auth_subr.c and gen/authenticate.c in libc (and login/login.c and xenocara/app/xenodm/greeter/verify.c).
0
Attacker Value
Unknown
CVE-2019-19519
Disclosure Date: December 05, 2019 (last updated November 27, 2024)
In OpenBSD 6.6, local users can use the su -L option to achieve any login class (often excluding root) because there is a logic error in the main function in su/su.c.
0
Attacker Value
Unknown
CVE-2019-8460
Disclosure Date: August 26, 2019 (last updated November 27, 2024)
OpenBSD kernel version <= 6.5 can be forced to create long chains of TCP SACK holes that causes very expensive calls to tcp_sack_option() for every incoming SACK packet which can lead to a denial of service.
0
Attacker Value
Unknown
CVE-2019-19522
Disclosure Date: August 08, 2019 (last updated November 27, 2024)
OpenBSD 6.6, in a non-default configuration where S/Key or YubiKey authentication is enabled, allows local users to become root by leveraging membership in the auth group. This occurs because root's file can be written to /etc/skey or /var/db/yubikey, and need not be owned by root.
0
Attacker Value
Unknown
CVE-2019-6110
Disclosure Date: January 31, 2019 (last updated November 27, 2024)
In OpenSSH 7.9, due to accepting and displaying arbitrary stderr output from the server, a malicious server (or Man-in-The-Middle attacker) can manipulate the client output, for example to use ANSI control codes to hide additional files being transferred.
0
Attacker Value
Unknown
CVE-2019-6109
Disclosure Date: January 31, 2019 (last updated November 08, 2023)
An issue was discovered in OpenSSH 7.9. Due to missing character encoding in the progress display, a malicious server (or Man-in-The-Middle attacker) can employ crafted object names to manipulate the client output, e.g., by using ANSI control codes to hide additional files being transferred. This affects refresh_progress_meter() in progressmeter.c.
0
Attacker Value
Unknown
CVE-2018-15473
Disclosure Date: August 17, 2018 (last updated November 27, 2024)
OpenSSH through 7.7 is prone to a user enumeration vulnerability due to not delaying bailout for an invalid authenticating user until after the packet containing the request has been fully parsed, related to auth2-gss.c, auth2-hostbased.c, and auth2-pubkey.c.
0