Page 22 of 133 results (0.004 seconds)

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc http://www.osvdb.org/1697 http://www.securityfocus.com/bid/2130 https://exchange.xforce.ibmcloud.com/vulnerabilities/6106 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

telnetd in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service by specifying an arbitrary large file in the TERMCAP environmental variable, which consumes resources as the server processes the file. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:69.telnetd.v1.1.asc http://www.osvdb.org/6083 https://exchange.xforce.ibmcloud.com/vulnerabilities/5959 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

ppp utility in FreeBSD 4.1.1 and earlier does not properly restrict access as specified by the "nat deny_incoming" command, which allows remote attackers to connect to the target system. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:70.ppp-nat.asc http://www.osvdb.org/1655 http://www.securityfocus.com/bid/1974 https://exchange.xforce.ibmcloud.com/vulnerabilities/5584 •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in catopen() function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to gain root privileges via a long environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc http://www.osvdb.org/6070 https://exchange.xforce.ibmcloud.com/vulnerabilities/5638 •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

The setlocale function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc •