Page 19 of 97 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 11EXPL: 0

FreeBSD 5.x, 4.x, and 3.x allows local users to cause a denial of service by executing a program with a malformed ELF image header. • http://archives.neohapsis.com/archives/freebsd/2000-08/0337.html http://www.osvdb.org/1534 http://www.securityfocus.com/bid/1625 https://exchange.xforce.ibmcloud.com/vulnerabilities/5967 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 0

Buffer overflow in the Linux binary compatibility module in FreeBSD 3.x through 5.x allows local users to gain root privileges via long filenames in the linux shadow file system. • http://archives.neohapsis.com/archives/freebsd/2000-08/0338.html http://www.osvdb.org/1536 http://www.securityfocus.com/bid/1628 https://exchange.xforce.ibmcloud.com/vulnerabilities/5968 •

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

Buffer overflows in brouted in FreeBSD and possibly other OSes allows local users to gain root privileges via long command line arguments. • http://archives.neohapsis.com/archives/freebsd/2000-08/0339.html http://www.securityfocus.com/bid/1629 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the existence of the /dev/random or /dev/urandom devices, which are absent on FreeBSD Alpha systems, which causes them to produce weak keys which may be more easily broken. • http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html http://www.securityfocus.com/bid/1340 •

CVSS: 2.1EPSS: 0%CPEs: 31EXPL: 0

The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-004.txt.asc http://www.openbsd.org/errata26.html#semconfig http://www.securityfocus.com/bid/1270 •