Page 34 of 213 results (0.028 seconds)

CVSS: 5.0EPSS: 1%CPEs: 2EXPL: 0

Vulnerability when Network Address Translation (NAT) is enabled in Linux 2.2.10 and earlier with ipchains, or FreeBSD 3.2 with ipfw, allows remote attackers to cause a denial of service (kernel panic) via a ping -R (record route) command. • http://marc.info/?l=bugtraq&m=93277426802802&w=2 http://marc.info/?l=bugtraq&m=93277766505061&w=2 http://www.iss.net/security_center/static/7257.php http://www.kernel.org/pub/linux/kernel/v2.2/patch-2.2.11.gz http://www.osvdb.org/6105 •

CVSS: 5.0EPSS: 0%CPEs: 23EXPL: 0

ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. ip_input.c en implementaciones de TCP/IP derivadas de BSD permiten a atacantes remotos causar una denegación de servicio (cuelgue o caída) mediante paquetes artesanales. • http://www.openbsd.org/errata23.html#tcpfix http://www.osvdb.org/5707 • CWE-20: Improper Input Validation •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

Buffer overflow in FreeBSD xmindpath allows local users to gain privileges via -f argument. • https://www.exploit-db.com/exploits/19652 http://www.osvdb.org/1150 http://www.securityfocus.com/bid/839 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 1

FreeBSD gdc program allows local users to modify files via a symlink attack. • https://www.exploit-db.com/exploits/19650 http://www.securityfocus.com/bid/835 •

CVSS: 4.6EPSS: 0%CPEs: 1EXPL: 1

FreeBSD seyon allows users to gain privileges via a modified PATH variable for finding the xterm and seyon-emu commands. • https://www.exploit-db.com/exploits/19609 http://www.osvdb.org/5996 http://www.securityfocus.com/bid/838 •