Page 31 of 180 results (0.002 seconds)

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 2

Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults. • https://www.exploit-db.com/exploits/19423 http://marc.info/?l=bugtraq&m=93207728118694&w=2 http://www.securityfocus.com/bid/526 https://exchange.xforce.ibmcloud.com/vulnerabilities/2351 •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

NetBSD allows ARP packets to overwrite static ARP entries. • http://www.osvdb.org/6539 •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

NetBSD on a multi-homed host allows ARP packets on one network to modify ARP entries on another connected network. • http://www.osvdb.org/6540 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

The SVR4 /dev/wabi special device file in NetBSD 1.3.3 and earlier allows a local user to read or write arbitrary files on the disk associated with that device. • http://www.osvdb.org/905 •