Page 10 of 54 results (0.012 seconds)

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

readline prior to 4.1, in OpenBSD 2.8 and earlier, creates history files with insecure permissions, which allows a local attacker to recover potentially sensitive information via readline history files. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.8/common/024_readline.patch http://www.osvdb.org/5680 https://exchange.xforce.ibmcloud.com/vulnerabilities/6586 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 0

The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html http://archives.neohapsis.com/archives/linux/caldera/2001-q4/0014.html http://archives.neohapsis.com/archives/netbsd/2001-q1/0093.html http://www.kb.cert.org/vuls/id/358960 http://www.openbsd.org/errata.html#userldt http://www.osvdb.org/6141 http://www.securityfocus.com/bid/2739 https://exchange.xforce.ibmcloud.com/vulnerabilities/6222 •

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in IPSEC authentication mechanism for OpenBSD 2.8 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a malformed Authentication header (AH) IPv4 option. • http://www.openbsd.org/errata.html#ipsec_ah http://www.osvdb.org/6026 •

CVSS: 5.0EPSS: 1%CPEs: 7EXPL: 3

OpenBSD 2.6 and earlier allows remote attackers to cause a denial of service by flooding the server with ARP requests. • https://www.exploit-db.com/exploits/20271 http://archives.neohapsis.com/archives/bugtraq/2000-10/0078.html http://www.osvdb.org/1592 http://www.securityfocus.com/bid/1759 https://exchange.xforce.ibmcloud.com/vulnerabilities/5340 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •