Page 11 of 192 results (0.007 seconds)

CVSS: 10.0EPSS: 1%CPEs: 12EXPL: 0

27 Jun 2001 — time server daemon timed allows remote attackers to cause a denial of service via malformed packets. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:28.timed.asc •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

27 Jun 2001 — rwho daemon rwhod in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service via malformed packets with a short length. • http://archives.neohapsis.com/archives/freebsd/2001-03/0163.html •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

18 Jun 2001 — Race condition in the UFS and EXT2FS file systems in FreeBSD 4.2 and earlier, and possibly other operating systems, makes deleted data available to user processes before it is zeroed out, which allows a local user to access otherwise restricted information. • http://archives.neohapsis.com/archives/freebsd/2001-03/0403.html •

CVSS: 7.5EPSS: 3%CPEs: 3EXPL: 1

18 Jun 2001 — IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 •

CVSS: 10.0EPSS: 35%CPEs: 51EXPL: 4

24 May 2001 — Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3. • https://www.exploit-db.com/exploits/20731 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

07 May 2001 — Buffer overflow in dc20ctrl before 0.4_1 in FreeBSD, and possibly other operating systems, allows local users to gain privileges. • http://archives.neohapsis.com/archives/freebsd/2001-02/0083.html •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

07 May 2001 — sort in FreeBSD 4.1.1 and earlier, and possibly other operating systems, uses predictable temporary file names and does not properly handle when the temporary file already exists, which causes sort to crash and possibly impacts security-sensitive scripts. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:13.sort.asc •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

03 May 2001 — inetd ident server in FreeBSD 4.x and earlier does not properly set group permissions, which allows remote attackers to read the first 16 bytes of files that are accessible by the wheel group. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:11.inetd.v1.1.asc •

CVSS: 7.5EPSS: 8%CPEs: 11EXPL: 2

26 Mar 2001 — ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection. • https://www.exploit-db.com/exploits/20593 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — The kernel in FreeBSD 3.2 follows symbolic links when it creates core dump files, which allows local attackers to modify arbitrary files. • http://www.osvdb.org/6084 •