Page 62 of 402 results (0.006 seconds)

CVSS: 1.2EPSS: 0%CPEs: 1EXPL: 0

periodic in FreeBSD 4.1.1 and earlier, and possibly other operating systems, allows local users to overwrite arbitrary files via a symlink attack. • http://www.kb.cert.org/vuls/id/626919 http://www.osvdb.org/1754 http://www.securityfocus.com/bid/2325 https://exchange.xforce.ibmcloud.com/vulnerabilities/6047 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

procfs in FreeBSD and possibly other operating systems allows local users to bypass access control restrictions for a jail environment and gain additional privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc http://www.osvdb.org/1691 http://www.securityfocus.com/bid/2132 https://exchange.xforce.ibmcloud.com/vulnerabilities/6108 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

Buffer overflow in kdc_reply_cipher of libkrb (Kerberos 4 authentication library) in NetBSD 1.5 and FreeBSD 4.2 and earlier, as used in Kerberised applications such as telnetd and login, allows local users to gain root privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-01:25.kerberosIV.asc ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-017.txt.asc https://exchange.xforce.ibmcloud.com/vulnerabilities/5734 •

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

procfs in FreeBSD and possibly other operating systems allows local users to cause a denial of service by calling mmap on the process' own mem file, which causes the kernel to hang. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc http://www.osvdb.org/1698 http://www.osvdb.org/6082 http://www.securityfocus.com/bid/2131 https://exchange.xforce.ibmcloud.com/vulnerabilities/6107 •

CVSS: 7.2EPSS: 0%CPEs: 4EXPL: 0

procfs in FreeBSD and possibly other operating systems does not properly restrict access to per-process mem and ctl files, which allows local users to gain root privileges by forking a child process and executing a privileged process from the child, while the parent retains access to the child's address space. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:77.procfs.v1.1.asc http://www.osvdb.org/1697 http://www.securityfocus.com/bid/2130 https://exchange.xforce.ibmcloud.com/vulnerabilities/6106 •