| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Webmin before 0.5 does not restrict the number of invalid passwords that are entered for a valid username, which could allow remote attackers to gain privileges via brute force password cracking. |
| Routed allows attackers to append data to files. |
| Denial of service of inetd on Linux through SYN and RST packets. |
| Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session. |
| Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems. |
| Livingston portmaster machines could be rebooted via a series of commands. |
| Idle locking function in MacOS 9 allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock. |
| Denial of service in Cisco IOS web server allows attackers to reboot the router using a long URL. |
| WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges. |
| Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service. |
| Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program. |
| IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files. |
| ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs. |
| Vulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files. |
| Remote execution of arbitrary commands through Guestbook CGI program. |
| Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET. |
| Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a "......" (modified dot dot) attack. |
| Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. |
| Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords. |
| Some configurations of NIS+ in Linux allowed attackers to log in as the user "+". |