CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress. |
MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4. |
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. |
rcvtty in BSD 3.0 and 4.0 does not properly drop privileges before executing a script, which allows local attackers to gain privileges by specifying an alternate Trojan horse script on the command line. |
Vulnerability in a system call in BSDI 3.0 and 3.1 allows local users to cause a denial of service (reboot) in the kernel via a particular sequence of instructions. |
Local user gains root privileges via buffer overflow in rdist, via expstr() function. |
IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash. |
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges. |
mmap function in BSD allows local attackers in the kmem group to modify memory through devices. |
OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices. |
Denial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load. |
Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly. |
Buffer overflow in Unix-to-Unix Copy Protocol (UUCP) in BSDI BSD/OS 3.0 through 4.2 allows local users to execute arbitrary code via a long command line argument. |
Buffer overflow of rlogin program using TERM environmental variable. |
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. |
NFS cache poisoning. |
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. |
Buffer overflow in xlock program allows local users to execute commands as root. |
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. |
Local user gains root privileges via buffer overflow in rdist, via lookup() function. |