Page 6 of 44 results (0.009 seconds)

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7575 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7574 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 http://www.ciac.org/ciac/bulletins/j-067.shtml http://www.securityfocus.com/bid/570 •

CVSS: 5.0EPSS: 0%CPEs: 20EXPL: 2

Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults. • https://www.exploit-db.com/exploits/19423 http://marc.info/?l=bugtraq&m=93207728118694&w=2 http://www.securityfocus.com/bid/526 https://exchange.xforce.ibmcloud.com/vulnerabilities/2351 •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

NetBSD allows ARP packets to overwrite static ARP entries. • http://www.osvdb.org/6539 •