Page 23 of 117 results (0.008 seconds)

CVSS: 2.1EPSS: 0%CPEs: 20EXPL: 1

FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers. • https://www.exploit-db.com/exploits/19488 http://www.securityfocus.com/bid/622 http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs%40ussrback.com http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9908270039010.16315-100000%40thetis.deor.org https://exchange.xforce.ibmcloud.com/vulnerabilities/3298 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 2

Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults. • https://www.exploit-db.com/exploits/19423 http://marc.info/?l=bugtraq&m=93207728118694&w=2 http://www.securityfocus.com/bid/526 https://exchange.xforce.ibmcloud.com/vulnerabilities/2351 •

CVSS: 7.2EPSS: 0%CPEs: 28EXPL: 2

A buffer overflow in lsof allows local users to obtain root privilege. • https://www.exploit-db.com/exploits/19373 https://www.exploit-db.com/exploits/19374 http://www.osvdb.org/3163 •

CVSS: 5.0EPSS: 14%CPEs: 33EXPL: 1

ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service. • https://www.exploit-db.com/exploits/19117 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0513 •

CVSS: 2.1EPSS: 0%CPEs: 17EXPL: 2

The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. • https://www.exploit-db.com/exploits/19346 http://marc.info/?l=bugtraq&m=87602167418317&w=2 http://marc.info/?l=bugtraq&m=87602248718482&w=2 http://www.iss.net/security_center/static/7172.php http://www.securityfocus.com/bid/456 •