Page 17 of 193 results (0.008 seconds)

CVSS: 5.0EPSS: 0%CPEs: 2EXPL: 0

The copy functions in locore.s such as copyout in OpenBSD 3.5 and 3.6, and possibly other BSD based operating systems, may allow attackers to exceed certain address boundaries and modify kernel memory. • http://secunia.com/advisories/14432 http://securitytracker.com/id?1013333 http://www.openbsd.org/errata.html#copy http://www.openbsd.org/errata35.html#locore http://www.securityfocus.com/bid/12825 https://exchange.xforce.ibmcloud.com/vulnerabilities/19531 •

CVSS: 5.0EPSS: 4%CPEs: 17EXPL: 1

The TCP stack (tcp_input.c) in OpenBSD 3.5 and 3.6 allows remote attackers to cause a denial of service (system panic) via crafted values in the TCP timestamp option, which causes invalid arguments to be used when calculating the retransmit timeout. • http://secunia.com/advisories/13819 http://securitytracker.com/id?1012861 http://www.openbsd.org/errata35.html http://www.securityfocus.com/bid/12250 •

CVSS: 7.1EPSS: 1%CPEs: 111EXPL: 1

Format string vulnerability in wrapper.c in CVS 1.12.x through 1.12.8, and 1.11.x through 1.11.16 allows remote attackers with CVSROOT commit access to cause a denial of service (application crash) and possibly execute arbitrary code via format string specifiers in a wrapper line. • https://www.exploit-db.com/exploits/24182 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-04:14.cvs.asc http://lists.grok.org.uk/pipermail/full-disclosure/2004-June/022441.html http://security.e-matters.de/advisories/092004.html http://www.securityfocus.com/bid/10499 https://exchange.xforce.ibmcloud.com/vulnerabilities/16365 •

CVSS: 2.1EPSS: 0%CPEs: 3EXPL: 0

Heap-based buffer overflow in isakmpd on OpenBSD 3.4 through 3.6 allows local users to cause a denial of service (panic) and corrupt memory via IPSEC credentials on a socket. • http://secunia.com/advisories/13443 http://securitytracker.com/id?1012511 http://www.openbsd.org/errata36.html http://www.osvdb.org/12400 http://www.securityfocus.com/bid/11928 https://exchange.xforce.ibmcloud.com/vulnerabilities/18486 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

OpenBSD 3.3 and 3.4 does not properly parse Accept and Deny rules without netmasks on big-endian 64-bit platforms such as SPARC64, which may allow remote attackers to bypass access restrictions. • http://www.openbsd.org/errata33.html http://www.openbsd.org/errata34.html http://www.securityfocus.com/bid/9867 •