Page 12 of 64 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

rwho daemon rwhod in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service via malformed packets with a short length. • http://archives.neohapsis.com/archives/freebsd/2001-03/0163.html http://www.securityfocus.com/bid/2473 https://exchange.xforce.ibmcloud.com/vulnerabilities/6229 •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

Race condition in the UFS and EXT2FS file systems in FreeBSD 4.2 and earlier, and possibly other operating systems, makes deleted data available to user processes before it is zeroed out, which allows a local user to access otherwise restricted information. • http://archives.neohapsis.com/archives/freebsd/2001-03/0403.html http://www.osvdb.org/5682 https://exchange.xforce.ibmcloud.com/vulnerabilities/6268 •

CVSS: 7.5EPSS: 2%CPEs: 3EXPL: 1

IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 http://archives.neohapsis.com/archives/freebsd/2001-04/0338.html http://marc.info/?l=bugtraq&m=98679734015538&w=2 https://exchange.xforce.ibmcloud.com/vulnerabilities/6331 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in dc20ctrl before 0.4_1 in FreeBSD, and possibly other operating systems, allows local users to gain privileges. • http://archives.neohapsis.com/archives/freebsd/2001-02/0083.html http://www.osvdb.org/6081 https://exchange.xforce.ibmcloud.com/vulnerabilities/6077 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-97:03.sysinstall.asc http://www.iss.net/security_center/static/7537.php http://www.osvdb.org/6087 •