Page 9 of 107 results (0.002 seconds)

CVSS: 7.5EPSS: 3%CPEs: 3EXPL: 1

18 Jun 2001 — IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. • https://www.exploit-db.com/exploits/20730 •

CVSS: 10.0EPSS: 35%CPEs: 51EXPL: 4

24 May 2001 — Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3. • https://www.exploit-db.com/exploits/20731 •

CVSS: 7.5EPSS: 8%CPEs: 11EXPL: 2

26 Mar 2001 — ipfw and ip6fw in FreeBSD 4.2 and earlier allows remote attackers to bypass access restrictions by setting the ECE flag in a TCP packet, which makes the packet appear to be part of an established connection. • https://www.exploit-db.com/exploits/20593 •

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

09 Jan 2001 — telnetd in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service by specifying an arbitrary large file in the TERMCAP environmental variable, which consumes resources as the server processes the file. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:69.telnetd.v1.1.asc •

CVSS: 7.8EPSS: 0%CPEs: 13EXPL: 2

19 Dec 2000 — Format string vulnerability in pw_error function in BSD libutil library allows local users to gain root privileges via a malformed password in commands such as chpass or passwd. • https://www.exploit-db.com/exploits/243 •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

11 Dec 2000 — Buffer overflow in catopen() function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to gain root privileges via a long environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc •

CVSS: 9.1EPSS: 4%CPEs: 5EXPL: 1

29 Nov 2000 — FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections. • https://www.exploit-db.com/exploits/19522 •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

29 Nov 2000 — The catopen function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc •

CVSS: 7.2EPSS: 0%CPEs: 12EXPL: 0

29 Nov 2000 — The setlocale function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc •

CVSS: 7.8EPSS: 0%CPEs: 4EXPL: 0

14 Nov 2000 — Multiple buffer overflows in eject on FreeBSD and possibly other OSes allows local users to gain root privileges. • http://archives.neohapsis.com/archives/freebsd/2000-09/0110.html •