| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Denial of service in Cisco IOS web server allows attackers to reboot the router using a long URL. |
| WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges. |
| Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service. |
| Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program. |
| IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files. |
| ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs. |
| Vulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files. |
| Remote execution of arbitrary commands through Guestbook CGI program. |
| Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET. |
| Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a "......" (modified dot dot) attack. |
| Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. |
| Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords. |
| Some configurations of NIS+ in Linux allowed attackers to log in as the user "+". |
| HP Remote Watch allows a remote user to gain root access. |
| Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack. |
| A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials. |
| The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash. |
| Denial of service in Qmail through long SMTP commands. |
| Denial of service in talk program allows remote attackers to disrupt a user's display. |
| Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls. |