Page 33 of 233 results (0.007 seconds)

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

Buffer overflow in catopen() function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to gain root privileges via a long environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc http://www.osvdb.org/6070 https://exchange.xforce.ibmcloud.com/vulnerabilities/5638 •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

The setlocale function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

The getnameinfo function in FreeBSD 4.1.1 and earlier, and possibly other operating systems, allows a remote attacker to cause a denial of service via a long DNS hostname. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:63.getnameinfo.asc http://www.securityfocus.com/bid/1894 https://exchange.xforce.ibmcloud.com/vulnerabilities/5454 •

CVSS: 7.2EPSS: 0%CPEs: 9EXPL: 2

Format string vulnerability in top program allows local attackers to gain root privileges via the "kill" or "renice" function. • https://www.exploit-db.com/exploits/20377 https://www.exploit-db.com/exploits/20378 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:62.top.v1.1.asc ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch http://www.securityfocus.com/bid/1895 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 1

FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections. • https://www.exploit-db.com/exploits/19522 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:52.tcp-iss.asc http://www.securityfocus.com/bid/1766 •