23 results (0.005 seconds)

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7575 •

CVSS: 5.0EPSS: 0%CPEs: 5EXPL: 0

traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc http://marc.info/?l=bugtraq&m=91893782027835&w=2 http://www.osvdb.org/7574 •

CVSS: 10.0EPSS: 0%CPEs: 30EXPL: 0

Buffer overflow in cpqlogin.htm in web-enabled agents for various Compaq management software products such as Insight Manager and Management Agents allows remote attackers to execute arbitrary commands via a long user name. • http://marc.info/?l=bugtraq&m=97967435023835&w=2 http://www.securityfocus.com/bid/2200 http://www5.compaq.com/products/servers/management/agentsecurity.html •

CVSS: 6.4EPSS: 0%CPEs: 1EXPL: 0

kdebug daemon (kdebugd) in Digital Unix 4.0F allows remote attackers to read arbitrary files by specifying the full file name in the initialization packet. • http://archives.neohapsis.com/archives/bugtraq/2000-09/0204.html •

CVSS: 7.5EPSS: 1%CPEs: 33EXPL: 0

The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 http://www.ciac.org/ciac/bulletins/k-001.shtml http://www.securityfocus.com/bid/637 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 •