Page 27 of 188 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

A FreeBSD patch for SSH on 2000-01-14 configures ssh to listen on port 722 as well as port 22, which might allow remote attackers to access SSH through port 722 even if port 22 is otherwise filtered. • http://archives.neohapsis.com/archives/freebsd/2000-06/0031.html http://www.osvdb.org/1387 http://www.securityfocus.com/bid/1323 https://exchange.xforce.ibmcloud.com/vulnerabilities/4638 •

CVSS: 2.1EPSS: 0%CPEs: 31EXPL: 0

The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-004.txt.asc http://www.openbsd.org/errata26.html#semconfig http://www.securityfocus.com/bid/1270 •

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 1

NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option. • https://www.exploit-db.com/exploits/19896 ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-002.txt.asc http://archives.neohapsis.com/archives/bugtraq/2000-05/0088.html http://www.securityfocus.com/bid/1173 •

CVSS: 7.2EPSS: 0%CPEs: 2EXPL: 3

xsoldier program allows local users to gain root access via a long argument. • https://www.exploit-db.com/exploits/19676 https://www.exploit-db.com/exploits/19677 https://www.exploit-db.com/exploits/229 http://marc.info/?l=freebsd-security&m=94531826621620&w=2 http://www.securityfocus.com/bid/871 •

CVSS: 7.2EPSS: 0%CPEs: 5EXPL: 0

Buffer overflow in the huh program in the orville-write package allows local users to gain root privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:10-orville-write.asc http://www.osvdb.org/1263 http://www.securityfocus.com/bid/1070 •