| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Remote access in AIX innd 1.5.1, using control messages. |
| RIP v1 is susceptible to spoofing. |
| Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. |
| Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon. |
| Local users can start Sendmail in daemon mode and gain root privileges. |
| Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access. |
| The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts. |
| The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file. |
| The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack. |
| The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. |
| The Perl fingerd program allows arbitrary command execution from remote users. |
| addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. |
| The SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access. |
| The DG/UX finger daemon allows remote command execution through shell metacharacters. |
| The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name. |
| Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke. |
| IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL. |
| The ghostscript command with the -dSAFER option allows remote attackers to execute commands. |
| wu-ftpd FTP daemon allows any user and password combination. |
| Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service. |