Page 8 of 43 results (0.006 seconds)

CVSS: 7.5EPSS: 9%CPEs: 9EXPL: 1

mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands. • https://www.exploit-db.com/exploits/26630 http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html http://cvsweb.netbsd.org/bsdweb.cgi/basesrc/usr.sbin/mopd/mopd/process.c.diff?r1=1.7&r2=1.8&f=h http://www.openbsd.org/errata.html#mopd http://www.redhat.com/support/errata/RHSA-2000-050.html http://www.securityfocus.com/bid/1559 •

CVSS: 2.1EPSS: 0%CPEs: 31EXPL: 0

The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-004.txt.asc http://www.openbsd.org/errata26.html#semconfig http://www.securityfocus.com/bid/1270 •

CVSS: 2.1EPSS: 0%CPEs: 8EXPL: 0

NetBSD 1.4.2 and earlier allows local users to cause a denial of service by repeatedly running certain system calls in the kernel which do not yield the CPU, aka "cpu-hog". • ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-005.txt.asc http://www.osvdb.org/1365 http://www.securityfocus.com/bid/1272 •

CVSS: 5.0EPSS: 3%CPEs: 5EXPL: 1

NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option. • https://www.exploit-db.com/exploits/19896 ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-002.txt.asc http://archives.neohapsis.com/archives/bugtraq/2000-05/0088.html http://www.securityfocus.com/bid/1173 •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 1

procfs in BSD systems allows local users to gain root privileges by modifying the /proc/pid/mem interface via a modified file descriptor for stderr. • https://www.exploit-db.com/exploits/19726 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2000-001.txt.asc http://www.osvdb.org/20760 http://www.securityfocus.com/bid/940 https://exchange.xforce.ibmcloud.com/vulnerabilities/3995 •