Page 9 of 56 results (0.007 seconds)

CVSS: 2.1EPSS: 0%CPEs: 4EXPL: 0

syslogd on OpenBSD 2.9 through 3.2 does not change the source IP address of syslog packets when the machine's IP addressed is changed without rebooting, e.g. via ifconfig, which can cause incorrect information to be sent to the syslog server. • http://archives.neohapsis.com/archives/bugtraq/2002-11/0272.html http://www.securityfocus.com/bid/6219 https://exchange.xforce.ibmcloud.com/vulnerabilities/10702 • CWE-16: Configuration •

CVSS: 3.7EPSS: 0%CPEs: 52EXPL: 0

Race condition in exec in OpenBSD 4.0 and earlier, NetBSD 1.5.2 and earlier, and FreeBSD 4.4 and earlier allows local users to gain privileges by attaching a debugger to a process before the kernel has determined that the process is setuid or setgid. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-02:08.exec.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-001.txt.asc http://www.osvdb.org/19475 http://www.securityfocus.com/bid/3891 https://exchange.xforce.ibmcloud.com/vulnerabilities/7945 •

CVSS: 5.1EPSS: 0%CPEs: 2EXPL: 0

isakmpd/message.c in isakmpd in FreeBSD before isakmpd-20020403_1, and in OpenBSD 3.1, allows remote attackers to cause a denial of service (crash) by sending Internet Key Exchange (IKE) payloads out of sequence. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SN-02:05.asc http://www.kb.cert.org/vuls/id/287771 http://www.openbsd.org/errata31.html#isakmpd https://exchange.xforce.ibmcloud.com/vulnerabilities/9850 •

CVSS: 6.8EPSS: 0%CPEs: 12EXPL: 1

The setitimer(2) system call in OpenBSD 2.0 through 3.1 does not properly check certain arguments, which allows local users to write to kernel memory and possibly gain root privileges, possibly via an integer signedness error. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.0/common/032_kerntime.patch http://www.iss.net/security_center/static/10278.php http://www.openbsd.org/plus32.html http://www.securityfocus.com/bid/5861 •

CVSS: 4.9EPSS: 0%CPEs: 2EXPL: 0

OpenBSD before 3.2 allows local users to cause a denial of service (kernel crash) via a call to getrlimit(2) with invalid arguments, possibly due to an integer signedness error. • ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.1/common/018_kernresource.patch http://www.iss.net/security_center/static/10572.php http://www.openbsd.org/errata30.html#kernresource http://www.openbsd.org/errata31.html#kernresource http://www.securityfocus.com/bid/6124 •