Show filters
193 Total Results
Displaying 181-190 of 193
Sort by:
Attacker Value
Unknown
CVE-1999-0484
Disclosure Date: February 23, 1999 (last updated February 22, 2025)
Buffer overflow in OpenBSD ping.
0
Attacker Value
Unknown
CVE-1999-0485
Disclosure Date: February 19, 1999 (last updated February 22, 2025)
Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD.
0
Attacker Value
Unknown
CVE-1999-0396
Disclosure Date: February 17, 1999 (last updated February 22, 2025)
A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.
0
Attacker Value
Unknown
CVE-1999-0798
Disclosure Date: December 04, 1998 (last updated February 22, 2025)
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
0
Attacker Value
Unknown
CVE-1999-0052
Disclosure Date: November 04, 1998 (last updated February 22, 2025)
IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.
0
Attacker Value
Unknown
CVE-1999-0062
Disclosure Date: August 03, 1998 (last updated February 22, 2025)
The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage.
0
Attacker Value
Unknown
CVE-1999-0303
Disclosure Date: May 21, 1998 (last updated February 22, 2025)
Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.
0
Attacker Value
Unknown
CVE-1999-0323
Disclosure Date: February 20, 1998 (last updated February 22, 2025)
FreeBSD mmap function allows users to modify append-only or immutable files.
0
Attacker Value
Unknown
CVE-1999-0304
Disclosure Date: February 01, 1998 (last updated February 22, 2025)
mmap function in BSD allows local attackers in the kmem group to modify memory through devices.
0
Attacker Value
Unknown
CVE-1999-0305
Disclosure Date: February 01, 1998 (last updated February 22, 2025)
The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections.
0