| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Vulnerability in Compaq Tru64 UNIX edauth command. |
| Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry. |
| Buffer overflow in Windows NT 4.0 help file utility via a malformed help file. |
| A remote attacker can disable the virus warning mechanism in Microsoft Excel 97. |
| IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key. |
| The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users. |
| Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request. |
| The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages. |
| The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input. |
| Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function. |
| When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page". |
| An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header. |
| A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted. |
| A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them. |
| The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack. |
| The KDE klock program allows local users to unlock a session using malformed input. |
| The logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files using symbolic links. |
| Buffer overflow in VMWare 1.0.1 for Linux via a long HOME environmental variable. |
| A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication. |
| KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories. |