ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
Max CVSS
5.0
EPSS Score
0.38%
Published
1999-12-30
Updated
2010-12-16
IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.
Max CVSS
5.0
EPSS Score
0.33%
Published
1998-11-04
Updated
2018-05-03
File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
Max CVSS
5.1
EPSS Score
0.37%
Published
1997-10-02
Updated
2022-08-17
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
Max CVSS
5.0
EPSS Score
0.54%
Published
1998-02-01
Updated
2018-05-03
Denial of service in "poll" in OpenBSD.
Max CVSS
5.0
EPSS Score
3.98%
Published
1999-03-22
Updated
2008-09-09
OpenBSD kernel crash through TSS handling, as caused by the crashme program.
Max CVSS
5.0
EPSS Score
3.84%
Published
1999-03-21
Updated
2008-09-09
A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted.
Max CVSS
5.0
EPSS Score
1.22%
Published
1999-08-06
Updated
2008-09-09
rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.
Max CVSS
5.0
EPSS Score
0.40%
Published
1997-08-24
Updated
2017-12-19
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Max CVSS
5.1
EPSS Score
0.60%
Published
2000-02-24
Updated
2008-09-10
IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets.
Max CVSS
5.0
EPSS Score
0.33%
Published
2001-03-12
Updated
2008-09-10
FTP servers such as OpenBSD ftpd, NetBSD ftpd, ProFTPd and Opieftpd do not properly cleanse untrusted format strings that are used in the setproctitle function (sometimes called by set_proc_title), which allows remote attackers to cause a denial of service or execute arbitrary commands.
Max CVSS
5.0
EPSS Score
4.08%
Published
2000-07-07
Updated
2008-09-10
OpenBSD 2.6 and earlier allows remote attackers to cause a denial of service by flooding the server with ARP requests.
Max CVSS
5.0
EPSS Score
1.16%
Published
2000-12-19
Updated
2017-10-10
The IPSEC implementation in OpenBSD 2.7 does not properly handle empty AH/ESP packets, which allows remote attackers to cause a denial of service.
Max CVSS
5.0
EPSS Score
0.81%
Published
2000-12-19
Updated
2018-05-03
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
Max CVSS
5.0
EPSS Score
0.77%
Published
2000-12-19
Updated
2018-05-03
Multiple TCP implementations could allow remote attackers to cause a denial of service (bandwidth and CPU exhaustion) by setting the maximum segment size (MSS) to a very small number and requesting large amounts of data, which generates more packets with less TCP-level data that amplify network traffic and consume more server CPU to process.
Max CVSS
5.0
EPSS Score
1.18%
Published
2001-07-07
Updated
2018-10-30
The "echo simulation" traffic analysis countermeasure in OpenSSH before 2.9.9p2 sends an additional echo packet after the password and carriage return is entered, which could allow remote attackers to determine that the countermeasure is being used.
Max CVSS
5.0
EPSS Score
0.54%
Published
2001-09-27
Updated
2008-09-05
The uipc system calls (uipc_syscalls.c) in OpenBSD 2.9 and 3.0 provide user mode return instead of versus rval kernel mode values to the fdrelease function, which allows local users to cause a denial of service and trigger a null dereference.
Max CVSS
5.5
EPSS Score
0.06%
Published
2001-12-31
Updated
2024-02-16
The TCP implementation in various BSD operating systems (tcp_input.c) does not properly block connections to broadcast addresses, which could allow remote attackers to bypass intended filters via packets with a unicast link layer address and an IP broadcast address.
Max CVSS
5.0
EPSS Score
0.16%
Published
2002-06-25
Updated
2008-09-05
PF in OpenBSD 3.0 with the return-rst rule sets the TTL to 128 in the RST packet, which allows remote attackers to determine if a port is being filtered because the TTL is different than the default TTL.
Max CVSS
5.0
EPSS Score
0.67%
Published
2002-08-12
Updated
2008-09-05
BIND 8.3.x through 8.3.3 allows remote attackers to cause a denial of service (termination due to assertion failure) via a request for a subdomain that does not exist, with an OPT resource record with a large UDP payload size.
Max CVSS
5.0
EPSS Score
15.20%
Published
2002-11-29
Updated
2018-05-03
BIND 8.x through 8.3.3 allows remote attackers to cause a denial of service (crash) via SIG RR elements with invalid expiry times, which are removed from the internal BIND database and later cause a null dereference.
Max CVSS
5.0
EPSS Score
5.35%
Published
2002-11-29
Updated
2018-05-03
Directory traversal vulnerabilities in multiple FTP clients on UNIX systems allow remote malicious FTP servers to create or overwrite files as the client user via filenames containing /absolute/path or .. (dot dot) sequences.
Max CVSS
5.0
EPSS Score
0.13%
Published
2002-12-23
Updated
2018-10-30
tip on multiple BSD-based operating systems allows local users to cause a denial of service (execution prevention) by using flock() to lock the /var/log/acculog file.
Max CVSS
5.5
EPSS Score
0.04%
Published
2002-12-31
Updated
2024-02-08
isakmpd/message.c in isakmpd in FreeBSD before isakmpd-20020403_1, and in OpenBSD 3.1, allows remote attackers to cause a denial of service (crash) by sending Internet Key Exchange (IKE) payloads out of sequence.
Max CVSS
5.1
EPSS Score
0.70%
Published
2002-12-31
Updated
2017-07-29
ssl3_get_record in s3_pkt.c for OpenSSL before 0.9.7a and 0.9.6 before 0.9.6i does not perform a MAC computation if an incorrect block cipher padding is used, which causes an information leak (timing discrepancy) that may make it easier to launch cryptographic attacks that rely on distinguishing between padding and MAC verification errors, possibly leading to extraction of the original plaintext, aka the "Vaudenay timing attack."
Max CVSS
5.0
EPSS Score
2.85%
Published
2003-03-03
Updated
2016-10-18
86 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!