Vulnerabilities
Vulnerable Software
Bsdi:  >> Bsd Os  >> 3.0  Security Vulnerabilities
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
CVSS Score
7.1
EPSS Score
0.004
Published
2008-10-20
Buffer overflow in Unix-to-Unix Copy Protocol (UUCP) in BSDI BSD/OS 3.0 through 4.2 allows local users to execute arbitrary code via a long command line argument.
CVSS Score
7.2
EPSS Score
0.001
Published
2001-12-31
Vulnerability in a system call in BSDI 3.0 and 3.1 allows local users to cause a denial of service (reboot) in the kernel via a particular sequence of instructions.
CVSS Score
2.1
EPSS Score
0.002
Published
2001-08-21
rcvtty in BSD 3.0 and 4.0 does not properly drop privileges before executing a script, which allows local attackers to gain privileges by specifying an alternate Trojan horse script on the command line.
CVSS Score
7.2
EPSS Score
0.001
Published
2001-01-09
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file.
CVSS Score
10.0
EPSS Score
0.031
Published
1999-10-01
Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly.
CVSS Score
5.0
EPSS Score
0.005
Published
1999-10-01
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
CVSS Score
10.0
EPSS Score
0.005
Published
1998-12-04
FreeBSD mmap function allows users to modify append-only or immutable files.
CVSS Score
10.0
EPSS Score
0.005
Published
1998-02-20
mmap function in BSD allows local attackers in the kmem group to modify memory through devices.
CVSS Score
7.2
EPSS Score
0.001
Published
1998-02-01
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
CVSS Score
5.0
EPSS Score
0.007
Published
1998-02-01


Contact Us

Shodan ® - All rights reserved