Page 10 of 52 results (0.004 seconds)

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 0

Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands via a configuration file directory name that contains formatting characters. • http://marc.info/?l=bugtraq&m=97068555106135&w=2 http://www.osvdb.org/6123 https://exchange.xforce.ibmcloud.com/vulnerabilities/5336 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 0

Format string vulnerabilities in eeprom program in OpenBSD, NetBSD, and possibly other operating systems allows local attackers to gain root privileges. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch http://www.securityfocus.com/bid/1752 https://exchange.xforce.ibmcloud.com/vulnerabilities/5337 •

CVSS: 5.0EPSS: 0%CPEs: 23EXPL: 0

ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. ip_input.c en implementaciones de TCP/IP derivadas de BSD permiten a atacantes remotos causar una denegación de servicio (cuelgue o caída) mediante paquetes artesanales. • http://www.openbsd.org/errata23.html#tcpfix http://www.osvdb.org/5707 • CWE-20: Improper Input Validation •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •

CVSS: 10.0EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type. • http://marc.info/?l=bugtraq&m=91278867118128&w=2 •