Page 6 of 77 results (0.001 seconds)

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 1

19 Dec 2000 — The IPSEC implementation in OpenBSD 2.7 does not properly handle empty AH/ESP packets, which allows remote attackers to cause a denial of service. • http://archives.neohapsis.com/archives/bugtraq/2000-09/0299.html •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 2

19 Dec 2000 — Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd. • https://www.exploit-db.com/exploits/243 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 2

19 Dec 2000 — Format string vulnerability in OpenBSD fstat program (and possibly other BSD-based operating systems) allows local users to gain root privileges via the PWD environmental variable. • https://www.exploit-db.com/exploits/20256 •

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

11 Dec 2000 — Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands via a configuration file directory name that contains formatting characters. • http://marc.info/?l=bugtraq&m=97068555106135&w=2 •

CVSS: 10.0EPSS: 2%CPEs: 10EXPL: 0

11 Dec 2000 — Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters. • http://www.securityfocus.com/archive/1/137890 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

29 Nov 2000 — Format string vulnerabilities in eeprom program in OpenBSD, NetBSD, and possibly other operating systems allows local attackers to gain root privileges. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch •

CVSS: 9.8EPSS: 1%CPEs: 9EXPL: 0

13 Oct 2000 — Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html •

CVSS: 9.8EPSS: 15%CPEs: 9EXPL: 1

13 Oct 2000 — mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/26630 •

CVSS: 6.2EPSS: 0%CPEs: 3EXPL: 0

19 Jan 2000 — The BSD make program allows local users to modify files via a symlink attack when the -j option is being used. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc •

CVSS: 7.5EPSS: 1%CPEs: 23EXPL: 0

30 Dec 1999 — ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. ip_input.c en implementaciones de TCP/IP derivadas de BSD permiten a atacantes remotos causar una denegación de servicio (cuelgue o caída) mediante paquetes artesanales. • http://www.openbsd.org/errata23.html#tcpfix • CWE-20: Improper Input Validation •