Page 16 of 80 results (0.011 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

The open() function in FreeBSD allows local attackers to write to arbitrary files. • http://www.osvdb.org/6092 •

CVSS: 7.5EPSS: 1%CPEs: 6EXPL: 0

Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-97:03.sysinstall.asc http://www.iss.net/security_center/static/7537.php http://www.osvdb.org/6087 •

CVSS: 7.2EPSS: 0%CPEs: 28EXPL: 1

Local user gains root privileges via buffer overflow in rdist, via lookup() function. • https://www.exploit-db.com/exploits/19106 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023 •

CVSS: 4.6EPSS: 0%CPEs: 4EXPL: 0

Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc http://ciac.llnl.gov/ciac/bulletins/g-24.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/7348 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

Vulnerability in union file system in FreeBSD 2.2 and earlier, and possibly other operating systems, allows local users to cause a denial of service (system reload) via a series of certain mount_union commands. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:10.mount_union.asc http://ciac.llnl.gov/ciac/bulletins/g-24.shtml http://www.iss.net/security_center/static/7429.php •