| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET. |
| Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a "......" (modified dot dot) attack. |
| Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. |
| Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords. |
| Some configurations of NIS+ in Linux allowed attackers to log in as the user "+". |
| HP Remote Watch allows a remote user to gain root access. |
| Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack. |
| A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials. |
| The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash. |
| Denial of service in Qmail through long SMTP commands. |
| Denial of service in talk program allows remote attackers to disrupt a user's display. |
| Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. |
| Buffer overflow in ircd allows arbitrary command execution. |
| Buffer overflow in War FTP allows remote execution of commands. |
| The info2www CGI script allows remote file access or remote command execution. |
| mSQL v2.0.1 and below allows remote execution through a buffer overflow. |
| Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server. |
| The WorkMan program can be used to overwrite any file to get root access. |
| Buffer overflow in chfn command in HP-UX 9.X through 10.20 allows local users to gain privileges via a long command line argument. |
| Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable. |