Page 88 of 463 results (0.026 seconds)

CVSS: 2.1EPSS: 0%CPEs: 6EXPL: 0

The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID. • http://www.openbsd.com/advisories/signals.txt http://www.osvdb.org/11062 https://exchange.xforce.ibmcloud.com/vulnerabilities/556 • CWE-255: Credentials Management Errors •

CVSS: 6.4EPSS: 0%CPEs: 4EXPL: 0

Listening TCP ports are sequentially allocated, allowing spoofing attacks. • https://www.cve.org/CVERecord?id=CVE-1999-0074 •

CVSS: 5.0EPSS: 0%CPEs: 4EXPL: 0

The rwho/rwhod service is running, which exposes machine status and user information. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628 •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0037 •

CVSS: 2.1EPSS: 0%CPEs: 17EXPL: 2

The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. • https://www.exploit-db.com/exploits/19346 http://marc.info/?l=bugtraq&m=87602167418317&w=2 http://marc.info/?l=bugtraq&m=87602248718482&w=2 http://www.iss.net/security_center/static/7172.php http://www.securityfocus.com/bid/456 •