Page 57 of 382 results (0.005 seconds)

CVSS: 2.1EPSS: 0%CPEs: 2EXPL: 0

sort in FreeBSD 4.1.1 and earlier, and possibly other operating systems, uses predictable temporary file names and does not properly handle when the temporary file already exists, which causes sort to crash and possibly impacts security-sensitive scripts. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:13.sort.asc http://www.securityfocus.com/bid/3960 https://exchange.xforce.ibmcloud.com/vulnerabilities/6038 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

inetd ident server in FreeBSD 4.x and earlier does not properly set group permissions, which allows remote attackers to read the first 16 bytes of files that are accessible by the wheel group. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:11.inetd.v1.1.asc http://www.osvdb.org/1753 http://www.securityfocus.com/bid/2324 https://exchange.xforce.ibmcloud.com/vulnerabilities/6052 •

CVSS: 7.5EPSS: 2%CPEs: 11EXPL: 2

ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection. • https://www.exploit-db.com/exploits/20593 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:08.ipfw.asc http://www.ciac.org/ciac/bulletins/l-029.shtml http://www.osvdb.org/1743 http://www.security-express.com/archives/bugtraq/2001-01/0424.html http://www.securityfocus.com/bid/2293 https://exchange.xforce.ibmcloud.com/vulnerabilities/5998 •

CVSS: 7.2EPSS: 0%CPEs: 15EXPL: 0

Zope before 2.2.4 does not properly compute local roles, which could allow users to bypass specified access restrictions and gain privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:06.zope.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000365 http://www.debian.org/security/2000/20001219 http://www.linux-mandrake.com/en/updates/2000/MDKSA-2000-083.php3 http://www.osvdb.org/6284 http://www.redhat.com/support/errata/RHSA-2000-127.html https://exchange.xforce.ibmcloud.com/vulnerabilities/5777 •

CVSS: 2.1EPSS: 0%CPEs: 1EXPL: 0

The kernel in FreeBSD 3.2 follows symbolic links when it creates core dump files, which allows local attackers to modify arbitrary files. • http://www.osvdb.org/6084 •