| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack. |
| The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. |
| An example application in ColdFusion Server 4.0 allows remote attackers to view source code via the sourcewindow.cfm file. |
| addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. |
| The installation of the fsp package 2.71-10 in Debian GNU/Linux 2.0 adds the anonymous FTP user without notifying the administrator, which could automatically enable anonymous FTP on some servers such as wu-ftp. |
| File creation and deletion, and remote execution, in the BSD line printer daemon (lpd). |
| Denial of service in Samba NETBIOS name service daemon (nmbd). |
| Red Hat pump DHCP client allows remote attackers to gain root access in some configurations. |
| NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it. |
| Symantec Mail-Gear 1.0 web interface server allows remote users to read arbitrary files via a .. (dot dot) attack. |
| Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port. |
| Denial of service in MDaemon 2.7 via a large number of connection attempts. |
| Buffer overflow in free internet chess server (FICS) program, xboard. |
| Denial of service in BIND named via maxdname. |
| The default permissions for Endymion MailMan allow local users to read email or modify files. |
| Ultimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to view the data if an error occurs when the HTTP server attempts to execute the file. |
| FreeBSD gdc program allows local users to modify files via a symlink attack. |
| Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server. |
| Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly. |
| Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack. |