Show filters
33 Total Results
Displaying 1-10 of 33
Sort by:
Attacker Value
Unknown

CVE-2010-2530

Disclosure Date: September 29, 2010 (last updated October 04, 2023)
Multiple integer signedness errors in smb_subr.c in the netsmb module in the kernel in NetBSD 5.0.2 and earlier, FreeBSD, and Apple Mac OS X allow local users to cause a denial of service (panic) via a negative size value in a /dev/nsmb ioctl operation, as demonstrated by a (1) SMBIOC_LOOKUP or (2) SMBIOC_OPENSESSION ioctl call.
0
Attacker Value
Unknown

CVE-2008-4609

Disclosure Date: October 20, 2008 (last updated October 04, 2023)
The TCP implementation in (1) Linux, (2) platforms based on BSD Unix, (3) Microsoft Windows, (4) Cisco products, and probably other operating systems allows remote attackers to cause a denial of service (connection queue exhaustion) via multiple vectors that manipulate information in the TCP state table, as demonstrated by sockstress.
0
Attacker Value
Unknown

CVE-2006-6652

Disclosure Date: December 20, 2006 (last updated October 04, 2023)
Buffer overflow in the glob implementation (glob.c) in libc in NetBSD-current before 20050914, NetBSD 2.* and 3.* before 20061203, and Apple Mac OS X before 2007-004, as used by the FTP daemon and tnftpd, allows remote authenticated users to execute arbitrary code via a long pathname that results from path expansion.
0
Attacker Value
Unknown

CVE-2004-0112

Disclosure Date: November 23, 2004 (last updated February 22, 2025)
The SSL/TLS handshaking code in OpenSSL 0.9.7a, 0.9.7b, and 0.9.7c, when using Kerberos ciphersuites, does not properly check the length of Kerberos tickets during a handshake, which allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that causes an out-of-bounds read.
0
Attacker Value
Unknown

CVE-2004-0079

Disclosure Date: November 23, 2004 (last updated February 22, 2025)
The do_change_cipher_spec function in OpenSSL 0.9.6c to 0.9.6k, and 0.9.7a to 0.9.7c, allows remote attackers to cause a denial of service (crash) via a crafted SSL/TLS handshake that triggers a null dereference.
Attacker Value
Unknown

CVE-2004-0081

Disclosure Date: November 23, 2004 (last updated February 22, 2025)
OpenSSL 0.9.6 before 0.9.6d does not properly handle unknown message types, which allows remote attackers to cause a denial of service (infinite loop), as demonstrated using the Codenomicon TLS Test Tool.
0
Attacker Value
Unknown

CVE-2003-0681

Disclosure Date: October 06, 2003 (last updated February 22, 2025)
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
0
Attacker Value
Unknown

CVE-2003-0694

Disclosure Date: October 06, 2003 (last updated February 22, 2025)
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
0
Attacker Value
Unknown

CVE-1999-0001

Disclosure Date: December 30, 1999 (last updated February 22, 2025)
ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
0
Attacker Value
Unknown

CVE-1999-0879

Disclosure Date: October 01, 1999 (last updated February 22, 2025)
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file.
0