Page 13 of 232 results (0.006 seconds)

CVSS: 5.0EPSS: 93%CPEs: 296EXPL: 2

Multiple TCP implementations with Protection Against Wrapped Sequence Numbers (PAWS) with the timestamps option enabled allow remote attackers to cause a denial of service (connection loss) via a spoofed packet with a large timer value, which causes the host to discard later packets because they appear to be too old. • https://www.exploit-db.com/exploits/1008 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:15.tcp.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.64/SCOSA-2005.64.txt http://secunia.com/advisories/15393 http://secunia.com/advisories/15417 http://secunia.com/advisories/18222 http://secunia.com/advisories/18662 http://support.avaya.com/elmodocs2/security/ASA-2006-032.htm http://www.cisco.com/warp/public/707/cisco-sn-20050518-tcpts.shtml http:/& •

CVSS: 4.6EPSS: 0%CPEs: 10EXPL: 0

FreeBSD 4.6 to 4.11 and 5.x to 5.4 uses insecure default permissions for the /dev/iir device, which allows local users to execute restricted ioctl calls to read or modify data on hardware that is controlled by the iir driver. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:06.iir.asc •

CVSS: 4.6EPSS: 0%CPEs: 9EXPL: 0

The i386_get_ldt system call in FreeBSD 4.7 to 4.11 and 5.x to 5.4 allows local users to access sensitive kernel memory via arguments with negative or very large values. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:07.ldt.asc •

CVSS: 4.6EPSS: 0%CPEs: 15EXPL: 0

The kernel in FreeBSD 4.x to 4.11 and 5.x to 5.4 does not properly clear certain fixed-length buffers when copying variable-length data for use by applications, which could allow those applications to read previously used sensitive memory. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:08.kmem.asc http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html http://secunia.com/advisories/17368 http://www.securityfocus.com/bid/13526 http://www.securityfocus.com/bid/15252 http://www.vupen.com/english/advisories/2005/2256 •

CVSS: 2.1EPSS: 0%CPEs: 61EXPL: 0

The SIOCGIFCONF ioctl (ifconf function) in FreeBSD 4.x through 4.11 and 5.x through 5.4 does not properly clear a buffer before using it, which allows local users to obtain portions of sensitive kernel memory. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-05:04.ifconf.asc http://lists.apple.com/archives/security-announce/2005/Oct/msg00000.html http://secunia.com/advisories/14959 http://secunia.com/advisories/17368 http://www.osvdb.org/15514 http://www.securityfocus.com/bid/15252 http://www.vupen.com/english/advisories/2005/2256 https://exchange.xforce.ibmcloud.com/vulnerabilities/20114 • CWE-399: Resource Management Errors •