Page 2 of 12 results (0.006 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

Multiple buffer overflows in the checkscores function in scores.c in tetris-bsd in bsd-games before 2.17-r1 in Gentoo Linux might allow local users with games group membership to gain privileges by modifying tetris-bsd.scores to contain crafted executable content, which is executed when another user launches tetris-bsd. • http://bugs.gentoo.org/show_bug.cgi?id=122399 http://secunia.com/advisories/19442 http://www.gentoo.org/security/en/glsa/glsa-200603-26.xml http://www.osvdb.org/24261 http://www.securityfocus.com/bid/17308 https://exchange.xforce.ibmcloud.com/vulnerabilities/25611 •

CVSS: 7.5EPSS: 19%CPEs: 4EXPL: 0

Buffer overflow in BSD line printer daemon (in.lpd or lpd) in various BSD-based operating systems allows remote attackers to execute arbitrary code via an incomplete print job followed by a request to display the printer queue. • ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-018.txt.asc ftp://stage.caldera.com/pub/security/openserver/CSSA-2001-SCO.20/CSSA-2001-SCO.20.txt http://www.cert.org/advisories/CA-2001-30.html http://www.kb.cert.org/vuls/id/274043 http://www.openbsd.com/errata28.html http://www.redhat.com/support/errata/RHSA-2001-147.html http://www.securityfocus.com/bid/3252 http://xforce.iss.net/alerts/advise94.php https://exchange.xforce.ibmcloud.com/vulnera •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 1

lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times. • http://ciac.llnl.gov/ciac/bulletins/e-25.shtml http://www.aenigma.net/resources/maillist/bugtraq/1994/0091.htm http://www.phreak.org/archives/security/8lgm/8lgm.lpr •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

BSD 4.4 based operating systems, when running at security level 1, allow the root user to clear the immutable and append-only flags for files by unmounting the file system and using a file system editor such as fsdb to directly modify the file through a device. • https://www.exploit-db.com/exploits/19411 http://marc.info/?l=bugtraq&m=93094058620450&w=2 http://www.securityfocus.com/bid/510 •

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID. • http://www.openbsd.com/advisories/signals.txt http://www.osvdb.org/11062 https://exchange.xforce.ibmcloud.com/vulnerabilities/556 • CWE-255: Credentials Management Errors •