cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2011-2895,https://securityvulnerability.io/vulnerability/CVE-2011-2895,,"The LZW decompressor in (1) the BufCompressedFill function in fontfile/decompress.c in X.Org libXfont before 1.4.4 and (2) compress/compress.c in 4.3BSD, as used in zopen.c in OpenBSD before 3.8, FreeBSD, NetBSD 4.0.x and 5.0.x before 5.0.3 and 5.1.x before 5.1.1, FreeType 2.1.9, and other products, does not properly handle code words that are absent from the decompression table when encountered, which allows context-dependent attackers to trigger an infinite loop or a heap-based buffer overflow, and possibly execute arbitrary code, via a crafted compressed stream, a related issue to CVE-2006-1168 and CVE-2011-2896.",OpenBSD,"OpenBSD,Freetype,Netbsd,Libxfont,FreeBSD",,,0.016270000487565994,false,false,false,false,,false,false,2011-08-19T17:00:00.000Z,0 CVE-2010-4754,https://securityvulnerability.io/vulnerability/CVE-2010-4754,,"The glob implementation in libc in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, and OpenBSD 4.7, and Libsystem in Apple Mac OS X before 10.6.8, allows remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in STAT commands to an FTP daemon, a different vulnerability than CVE-2010-2632.",OpenBSD,"OpenBSD,Mac Os X,Netbsd,FreeBSD",,,0.008379999548196793,false,false,false,false,,false,false,2011-03-02T19:00:00.000Z,0 CVE-2010-4755,https://securityvulnerability.io/vulnerability/CVE-2010-4755,,"The (1) remote_glob function in sftp-glob.c and the (2) process_put function in sftp.c in OpenSSH 5.8 and earlier, as used in FreeBSD 7.3 and 8.1, NetBSD 5.0.2, OpenBSD 4.7, and other products, allow remote authenticated users to cause a denial of service (CPU and memory consumption) via crafted glob expressions that do not match any pathnames, as demonstrated by glob expressions in SSH_FXP_STAT requests to an sftp daemon, a different vulnerability than CVE-2010-2632.",OpenBSD,"Openssh,FreeBSD,Netbsd,OpenBSD",,,0.009879999794065952,false,false,false,false,,false,false,2011-03-02T19:00:00.000Z,0 CVE-2009-0687,https://securityvulnerability.io/vulnerability/CVE-2009-0687,,"The pf_test_rule function in OpenBSD Packet Filter (PF), as used in OpenBSD 4.2 through 4.5, NetBSD 5.0 before RC3, MirOS 10 and earlier, and MidnightBSD 0.3-current allows remote attackers to cause a denial of service (panic) via crafted IP packets that trigger a NULL pointer dereference during translation, related to an IPv4 packet with an ICMPv6 payload.",OpenBSD,"OpenBSD,Miros,Netbsd,Midnightbsd",,,0.07977999746799469,false,false,false,false,,false,false,2009-08-11T10:00:00.000Z,0 CVE-2008-1215,https://securityvulnerability.io/vulnerability/CVE-2008-1215,,"Stack-based buffer overflow in the command_Expand_Interpret function in command.c in ppp (aka user-ppp), as distributed in FreeBSD 6.3 and 7.0, OpenBSD 4.1 and 4.2, and the net/userppp package for NetBSD, allows local users to gain privileges via long commands containing ""~"" characters.",OpenBSD,"OpenBSD,FreeBSD,Netbsd",,,0.0004199999966658652,false,false,false,false,,false,false,2008-03-09T02:00:00.000Z,0 CVE-2006-5218,https://securityvulnerability.io/vulnerability/CVE-2006-5218,,"Integer overflow in the systrace_preprepl function (STRIOCREPLACE) in systrace in OpenBSD 3.9 and NetBSD 3 allows local users to cause a denial of service (crash), gain privileges, or read arbitrary kernel memory via large numeric arguments to the systrace ioctl.",OpenBSD,"OpenBSD,Netbsd",,,0.0006000000284984708,false,false,false,false,,false,false,2006-10-10T04:06:00.000Z,0 CVE-2004-0114,https://securityvulnerability.io/vulnerability/CVE-2004-0114,,"The shmat system call in the System V Shared Memory interface for FreeBSD 5.2 and earlier, NetBSD 1.3 and earlier, and OpenBSD 2.6 and earlier, does not properly decrement a shared memory segment's reference count when the vm_map_find function fails, which could allow local users to gain read or write access to a portion of kernel memory and gain privileges.",OpenBSD,"OpenBSD,FreeBSD,Netbsd",,,0.0004199999966658652,false,false,false,false,,false,false,2004-03-03T05:00:00.000Z,0 CVE-2001-1145,https://securityvulnerability.io/vulnerability/CVE-2001-1145,,"fts routines in FreeBSD 4.3 and earlier, NetBSD before 1.5.2, and OpenBSD 2.9 and earlier can be forced to change (chdir) into a different directory than intended when the directory above the current directory is moved, which could cause scripts to perform dangerous actions on the wrong directories.",OpenBSD,"OpenBSD,Netbsd,FreeBSD",,,0.000590000010561198,false,false,false,false,,false,false,2001-08-17T04:00:00.000Z,0 CVE-2001-0268,https://securityvulnerability.io/vulnerability/CVE-2001-0268,,"The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address.",OpenBSD,"OpenBSD,Netbsd",,,0.0004199999966658652,false,false,false,false,,false,false,2001-05-03T04:00:00.000Z,0