Page 56 of 322 results (0.007 seconds)

CVSS: 5.0EPSS: 0%CPEs: 1EXPL: 0

IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets. • http://www.openbsd.org/errata24.html#maxqueue http://www.osvdb.org/7539 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The i386 trace-trap handling in OpenBSD 2.4 with DDB enabled allows a local user to cause a denial of service. • http://www.openbsd.org/errata24.html#trctrap http://www.osvdb.org/6126 •

CVSS: 10.0EPSS: 12%CPEs: 13EXPL: 3

CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow. • https://www.exploit-db.com/exploits/349 https://www.exploit-db.com/exploits/20617 http://marc.info/?l=bugtraq&m=98168366406903&w=2 http://razor.bindview.com/publish/advisories/adv_ssh1crc.html http://www.cert.org/advisories/CA-2001-35.html http://www.osvdb.org/503 http://www.osvdb.org/795 http://www.securityfocus.com/bid/2347 https://exchange.xforce.ibmcloud.com/vulnerabilities/6083 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

cron in OpenBSD 2.5 allows local users to gain root privileges via an argv[] that is not NULL terminated, which is passed to cron's fake popen function. • http://www.openbsd.org/errata25.html#cron •

CVSS: 10.0EPSS: 2%CPEs: 10EXPL: 3

One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/234 https://www.exploit-db.com/exploits/20512 ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-018.txt.asc http://archives.neohapsis.com/archives/bugtraq/2000-12/0275.html http://www.openbsd.org/advisories/ftpd_replydirname.txt http://www.securityfocus.com/bid/2124 https://exchange.xforce.ibmcloud.com/vulnerabilities/5776 •