Local attackers can exploit this issue to execute arbitrary code with superuser privileges. Successfully exploiting this issue will facilitate in the complete compromise of affected computers.
The FreeBSD kernel provides support for a variety of different types of communications sockets, including IPv4, IPv6, ISDN, ATM, routing protocol, link-layer, netgraph(4), and bluetooth sockets. Some function pointers for netgraph and bluetooth sockets are not properly initialized. This can be exploited to e.g. read or write to arbitrary kernel memory via a specially crafted "socket()" system call, and allows an unprivileged process to elevate privileges to root or escape a FreeBSD jail.
This module exploits a stack buffer overflow vulnerability in the Sourcefire Snort DCE/RPC preprocessor. An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code with the privileges of the Snort process.
This update improves the reliability for Redhat Enterprise Linux 4 and FreeBSD 6.2 on Impact 8.0
This update improves the reliability for Redhat Enterprise Linux 4 and FreeBSD 6.2 on Impact 8.0
This module exploits a stack buffer overflow vulnerability in the Sourcefire Snort DCE/RPC preprocessor. An unauthenticated, remote attacker can exploit this vulnerability to execute arbitrary code with the privileges of the Snort process.
This update adds support for Redhat Enterprise Linux 4 and FreeBSD 6.2 on Impact 7.5
This update adds support for Redhat Enterprise Linux 4 and FreeBSD 6.2 on Impact 7.5
This update adds support for Linux, Freebsd and additional MySQL versions.
This update adds the vulnerability name to reports.
This module exploits a remote buffer-overflow in MySQL servers using yaSSL.
This module exploits a command injection error in the function runScripts in vdccm (SynCE daemon), reached through an information message remote request.
The format string protection mechanism in IMAPD for Perdition Mail Retrieval Proxy 1.17 and earlier allows remote attackers to execute arbitrary code via an IMAP tag with a null byte followed by a format string specifier, which is not counted by the mechanism.
This update adds support for FreeBSD and OpenBSD.
This module exploits a command injection vulnerability in the function AddPrinterW in Samba 3, reached through an AddPrinter remote request.
This module exploits a command injection vulnerability in the function AddPrinterW in Samba 3, reached through an AddPrinter remote request.
Pagination
- Previous page
- Page 5
- Next page