Page 2 of 15 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 6EXPL: 0

The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections. • http://www.openbsd.org/advisories/sourceroute.txt http://www.osvdb.org/11502 https://exchange.xforce.ibmcloud.com/vulnerabilities/736 •

CVSS: 7.2EPSS: 0%CPEs: 8EXPL: 4

Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. • https://www.exploit-db.com/exploits/200 https://www.exploit-db.com/exploits/320 https://www.exploit-db.com/exploits/19546 https://www.exploit-db.com/exploits/19547 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0034 •

CVSS: 7.2EPSS: 0%CPEs: 43EXPL: 5

Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. • https://www.exploit-db.com/exploits/331 https://www.exploit-db.com/exploits/322 https://www.exploit-db.com/exploits/19200 https://www.exploit-db.com/exploits/19201 https://www.exploit-db.com/exploits/19202 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0040 •

CVSS: 8.4EPSS: 0%CPEs: 45EXPL: 2

Buffer overflow in xlock program allows local users to execute commands as root. • https://www.exploit-db.com/exploits/19173 https://www.exploit-db.com/exploits/19172 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 10.0EPSS: 11%CPEs: 8EXPL: 1

Buffer overflow in University of Washington's implementation of IMAP and POP servers. • https://www.exploit-db.com/exploits/340 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0042 •