Page 29 of 330 results (0.014 seconds)

CVSS: 10.0EPSS: 0%CPEs: 1EXPL: 0

03 May 2001 — Buffer overflow in IPSEC authentication mechanism for OpenBSD 2.8 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a malformed Authentication header (AH) IPv4 option. • http://www.openbsd.org/errata.html#ipsec_ah •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 0

03 May 2001 — The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html •

CVSS: 10.0EPSS: 30%CPEs: 13EXPL: 3

12 Mar 2001 — CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow. • https://www.exploit-db.com/exploits/349 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets. • http://www.openbsd.org/errata24.html#maxqueue •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — The i386 trace-trap handling in OpenBSD 2.4 with DDB enabled allows a local user to cause a denial of service. • http://www.openbsd.org/errata24.html#trctrap •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

12 Mar 2001 — Vulnerability in OpenBSD 2.6 allows a local user to change interface media configurations. • http://www.openbsd.org/errata.html#ifmedia •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Feb 2001 — cron in OpenBSD 2.5 allows local users to gain root privileges via an argv[] that is not NULL terminated, which is passed to cron's fake popen function. • http://www.openbsd.org/errata25.html#cron •

CVSS: 10.0EPSS: 3%CPEs: 10EXPL: 3

12 Feb 2001 — One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/234 •

CVSS: 9.8EPSS: 1%CPEs: 1EXPL: 0

09 Jan 2001 — OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0195.html •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 2

19 Dec 2000 — Format string vulnerability in OpenBSD fstat program (and possibly other BSD-based operating systems) allows local users to gain root privileges via the PWD environmental variable. • https://www.exploit-db.com/exploits/20256 •