Page 21 of 303 results (0.013 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

07 May 2001 — Buffer overflow in dc20ctrl before 0.4_1 in FreeBSD, and possibly other operating systems, allows local users to gain privileges. • http://archives.neohapsis.com/archives/freebsd/2001-02/0083.html •

CVSS: 9.1EPSS: 0%CPEs: 2EXPL: 0

07 May 2001 — sort in FreeBSD 4.1.1 and earlier, and possibly other operating systems, uses predictable temporary file names and does not properly handle when the temporary file already exists, which causes sort to crash and possibly impacts security-sensitive scripts. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:13.sort.asc •

CVSS: 7.5EPSS: 0%CPEs: 4EXPL: 0

03 May 2001 — inetd ident server in FreeBSD 4.x and earlier does not properly set group permissions, which allows remote attackers to read the first 16 bytes of files that are accessible by the wheel group. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:11.inetd.v1.1.asc •

CVSS: 7.5EPSS: 2%CPEs: 11EXPL: 2

26 Mar 2001 — ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection. • https://www.exploit-db.com/exploits/20593 •

CVSS: 7.8EPSS: 0%CPEs: 15EXPL: 0

12 Mar 2001 — Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:06.zope.asc •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — The kernel in FreeBSD 3.2 follows symbolic links when it creates core dump files, which allows local attackers to modify arbitrary files. • http://www.osvdb.org/6084 •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

16 Feb 2001 — periodic in FreeBSD 4.1.1 and earlier, and possibly other operating systems, allows local users to overwrite arbitrary files via a symlink attack. • http://www.kb.cert.org/vuls/id/626919 •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

12 Feb 2001 — procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

12 Feb 2001 — procfs in FreeBSD and possibly other operating systems allows local users to bypass access control restrictions for a jail environment and gain additional privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Feb 2001 — Buffer overflow in kdc_reply_cipher of libkrb (Kerberos 4 authentication library) in NetBSD 1.5 and FreeBSD 4.2 and earlier, as used in Kerberised applications such as telnetd and login, allows local users to gain root privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:25.kerberosIV.asc •