Page 6 of 58 results (0.009 seconds)

CVSS: 7.8EPSS: 0%CPEs: 5EXPL: 0

11 Dec 2000 — Format string vulnerability in OpenBSD photurisd allows local users to execute arbitrary commands via a configuration file directory name that contains formatting characters. • http://marc.info/?l=bugtraq&m=97068555106135&w=2 •

CVSS: 10.0EPSS: 2%CPEs: 10EXPL: 0

11 Dec 2000 — Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters. • http://www.securityfocus.com/archive/1/137890 •

CVSS: 7.8EPSS: 0%CPEs: 8EXPL: 0

29 Nov 2000 — Format string vulnerabilities in eeprom program in OpenBSD, NetBSD, and possibly other operating systems allows local attackers to gain root privileges. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch •

CVSS: 9.8EPSS: 1%CPEs: 9EXPL: 0

13 Oct 2000 — Buffer overflow in mopd (Maintenance Operations Protocol loader daemon) allows remote attackers to execute arbitrary commands via a long file name. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html •

CVSS: 9.8EPSS: 15%CPEs: 9EXPL: 1

13 Oct 2000 — mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/26630 •

CVSS: 6.2EPSS: 0%CPEs: 3EXPL: 0

19 Jan 2000 — The BSD make program allows local users to modify files via a symlink attack when the -j option is being used. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc •

CVSS: 7.5EPSS: 0%CPEs: 20EXPL: 1

05 Sep 1999 — FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers. • https://www.exploit-db.com/exploits/19488 •

CVSS: 7.2EPSS: 0%CPEs: 27EXPL: 2

09 Aug 1999 — The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 •