| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness. |
| IP traceroute is allowed from arbitrary hosts. |
| Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option. |
| An SNMP community name is guessable. |
| A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. |
| sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. |
| ICMP echo (ping) is allowed from arbitrary hosts. |
| Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL. |
| Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable. |
| Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option. |
| The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate. |
| When Javascript is embedded within the TITLE tag, Netscape Communicator allows a remote attacker to use the "about" protocol to gain access to browser information. |
| Denial of service in Sendmail 8.8.6 in HPUX. |
| Denial of service in Gauntlet Firewall via a malformed ICMP packet. |
| A service or application has a backdoor password that was placed there by the developer. |
| HP CDE program includes the current directory in root's PATH variable. |
| A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of. |
| IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request. |
| Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x. |
| The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten. |