Page 30 of 232 results (0.005 seconds)

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in dc20ctrl before 0.4_1 in FreeBSD, and possibly other operating systems, allows local users to gain privileges. • http://archives.neohapsis.com/archives/freebsd/2001-02/0083.html http://www.osvdb.org/6081 https://exchange.xforce.ibmcloud.com/vulnerabilities/6077 •

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

sort in FreeBSD 4.1.1 and earlier, and possibly other operating systems, uses predictable temporary file names and does not properly handle when the temporary file already exists, which causes sort to crash and possibly impacts security-sensitive scripts. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:13.sort.asc http://www.securityfocus.com/bid/3960 https://exchange.xforce.ibmcloud.com/vulnerabilities/6038 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

inetd ident server in FreeBSD 4.x and earlier does not properly set group permissions, which allows remote attackers to read the first 16 bytes of files that are accessible by the wheel group. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:11.inetd.v1.1.asc http://www.osvdb.org/1753 http://www.securityfocus.com/bid/2324 https://exchange.xforce.ibmcloud.com/vulnerabilities/6052 •

CVSS: 7.5EPSS: 2%CPEs: 11EXPL: 2

ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection. • https://www.exploit-db.com/exploits/20593 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc http://www.ciac.org/ciac/bulletins/l-029.shtml http://www.osvdb.org/1743 http://www.security-express.com/archives/bugtraq/2001-01/0424.html http://www.securityfocus.com/bid/2293 https://exchange.xforce.ibmcloud.com/vulnerabilities/5998 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The kernel in FreeBSD 3.2 follows symbolic links when it creates core dump files, which allows local attackers to modify arbitrary files. • http://www.osvdb.org/6084 •