Page 29 of 192 results (0.007 seconds)

CVSS: 4.6EPSS: 0%CPEs: 5EXPL: 1

asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file. • https://www.exploit-db.com/exploits/19756 http://www.securityfocus.com/bid/996 http://www.securityfocus.com/templates/advisory.html?id=2092 •

CVSS: 6.2EPSS: 0%CPEs: 3EXPL: 0

The BSD make program allows local users to modify files via a symlink attack when the -j option is being used. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc http://www.securityfocus.com/bid/939 •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 0

Buffer overflow in FreeBSD fts library routines allows local user to modify arbitrary files via the periodic program. • http://www.osvdb.org/1074 http://www.securityfocus.com/bid/644 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in FreeBSD setlocale in the libc module allows attackers to execute arbitrary code via a long PATH_LOCALE environment variable. • http://www.osvdb.org/6086 •

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Vulnerability when Network Address Translation (NAT) is enabled in Linux 2.2.10 and earlier with ipchains, or FreeBSD 3.2 with ipfw, allows remote attackers to cause a denial of service (kernel panic) via a ping -R (record route) command. • http://marc.info/?l=bugtraq&m=93277426802802&w=2 http://marc.info/?l=bugtraq&m=93277766505061&w=2 http://www.iss.net/security_center/static/7257.php http://www.kernel.org/pub/linux/kernel/v2.2/patch-2.2.11.gz http://www.osvdb.org/6105 •