Page 89 of 515 results (0.008 seconds)

CVSS: 5.0EPSS: 13%CPEs: 7EXPL: 1

BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters. • https://www.exploit-db.com/exploits/20060 http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt http://www.redhat.com/support/errata/RHSA •

CVSS: 10.0EPSS: 8%CPEs: 2EXPL: 1

Buffer overflow in Canna input system allows remote attackers to execute arbitrary commands via an SR_INIT command with a long user name or group name. • https://www.exploit-db.com/exploits/20061 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:31.canna.asc.v1.1 http://shadowpenguin.backsection.net/advisories/advisory038.html http://www.securityfocus.com/bid/1445 https://exchange.xforce.ibmcloud.com/vulnerabilities/4912 •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the existence of the /dev/random or /dev/urandom devices, which are absent on FreeBSD Alpha systems, which causes them to produce weak keys which may be more easily broken. • http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html http://www.securityfocus.com/bid/1340 •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 2

A FreeBSD patch for SSH on 2000-01-14 configures ssh to listen on port 722 as well as port 22, which might allow remote attackers to access SSH through port 722 even if port 22 is otherwise filtered. • http://archives.neohapsis.com/archives/freebsd/2000-06/0031.html http://www.osvdb.org/1387 http://www.securityfocus.com/bid/1323 https://exchange.xforce.ibmcloud.com/vulnerabilities/4638 •

CVSS: 2.1EPSS: 0%CPEs: 31EXPL: 0

The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-004.txt.asc http://www.openbsd.org/errata26.html#semconfig http://www.securityfocus.com/bid/1270 •