CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 93694 CVEs

CVE ID Severity Description EPSS Published
7.8 HIGH

Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local attacker to read a "secure" hidden form value from a temporary file and craft a LYNXOPTIONS: URL that causes Lynx to modify the user's configuration file and execute commands.

0.2% 1999-11-16
N/A

Web server in Tektronix PhaserLink Printer 840.0 and earlier allows a remote attacker to gain administrator access by directly calling undocumented URLs such as ncl_items.html and ncl_subjects.html.

2.9% 1999-11-16
N/A

Buffer overflow in thttpd HTTP server before 2.04-31 allows remote attackers to execute arbitrary commands via a long date string, which is not properly handled by the tdate_parse function.

1.1% 1999-11-16
N/A

Default configuration in Matt Wright FormHandler.cgi script allows arbitrary directories to be used for attachments, and only restricts access to the /etc/ directory, which allows remote attackers to read arbitrary files via the reply_message_attach attachment parameter.

0.8% 1999-11-16
N/A

Buffer overflow in POP3 server of Admiral Systems EmailClub 1.05 allows remote attackers to execute arbitrary commands via a long "From" header in an e-mail message.

3.8% 1999-11-15
N/A

ProSoft Netware Client 5.12 on Macintosh MacOS 9 does not automatically log a user out of the NDS tree when the user logs off the system, which allows other users of the same system access to the unprotected NDS session.

0.1% 1999-11-14
N/A

Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client.

23.5% 1999-11-14
N/A

The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands.

8.5% 1999-11-13
N/A

The networking software in Windows 95 and Windows 98 allows remote attackers to execute commands via a long file name string, aka the "File Access URL" vulnerability.

22.9% 1999-11-12
N/A

Directory traversal vulnerability in Matt Wright FormHandler.cgi script allows remote attackers to read arbitrary files via (1) a .. (dot dot) in the reply_message_attach attachment parameter, or (2) by specifying the filename as a template.

4.8% 1999-11-12
N/A

A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the "Active Setup Control" vulnerability.

7.3% 1999-11-11
N/A

Buffer overflow in FTP server in QPC Software's QVT/Term Plus versions 4.2d and 4.3 and QVT/Net 4.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long (1) user name or (2) password.

15.1% 1999-11-10
N/A

Buffer overflows in Xtramail 1.11 allow attackers to cause a denial of service (crash) and possibly execute arbitrary commands via (1) a long PASS command in the POP3 service, (2) a long HELO command in the SMTP service, or (3) a long user name in the Control Service.

1.8% 1999-11-10
N/A

Denial of service in BIND named via naptr.

0.1% 1999-11-10
N/A

Denial of service in BIND named via maxdname.

1.9% 1999-11-10
N/A

Denial of service in BIND named via consuming more than "fdmax" file descriptors.

10.2% 1999-11-10
N/A

Denial of service in BIND by improperly closing TCP sessions via so_linger.

1.4% 1999-11-10
N/A

Denial of service in BIND named via malformed SIG records.

0.6% 1999-11-10
N/A

Buffer overflow in BIND 8.2 via NXT records.

1.5% 1999-11-10
N/A

Buffer overflow in IrfanView32 3.07 and earlier allows attackers to execute arbitrary commands via a long string after the "8BPS" image type in a Photo Shop image header.

6.0% 1999-11-09
N/A

Vulnerability in StackGuard before 1.21 allows remote attackers to bypass the Random and Terminator Canary security mechanisms by using a non-linear attack which directly modifies a pointer to a return address instead of using a buffer overflow to reach the return address entry itself.

0.7% 1999-11-09
N/A

CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.

4.4% 1999-11-09
N/A

Matt's Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.

0.8% 1999-11-09
N/A

Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.

0.8% 1999-11-09
N/A

Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname.

1.2% 1999-11-09
N/A

A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server.

11.1% 1999-11-08
N/A

bigconf.conf in F5 BIG/ip 2.1.2 and earlier allows remote attackers to read arbitrary files by specifying the target file in the "file" parameter.

3.0% 1999-11-08
N/A

cgiwrap as used on Cobalt RaQ 2.0 and RaQ 3i does not properly identify the user for running certain scripts, which allows a malicious site administrator to view or modify data located at another virtual site on the same system.

0.1% 1999-11-08
N/A

Buffer overflow in FreeBSD seyon via HOME environmental variable, -emulator argument, -modems argument, or the GUI.

0.1% 1999-11-08
N/A

FreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulator argument.

0.3% 1999-11-08
N/A

Eicon Technology Diva LAN ISDN modem allows a remote attacker to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service.

9.8% 1999-11-07
N/A

A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3.3 for NT, which may allow an attacker to execute arbitrary code.

15.0% 1999-11-07
N/A

Buffer overflow in sar for SCO OpenServer 5.0.0 through 5.0.5 may allow local users to gain root privileges via a long -f parameter, a different vulnerability than CVE-1999-1570.

0.1% 1999-11-04
N/A

Directory traversal vulnerability in Etype Eserv 2.50 web server allows a remote attacker to read any file in the file system via a .. (dot dot) in a URL.

3.4% 1999-11-04
N/A

Buffer overflow in faxalter in hylafax 4.0.2 allows local users to gain privileges via a long -m command line argument.

0.4% 1999-11-04
N/A

Palm Pilot HotSync Manager 3.0.4 in Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 14238 while the manager is in network mode.

0.8% 1999-11-04
N/A

The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider.

2.7% 1999-11-04
N/A

Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request.

3.8% 1999-11-04
N/A

Buffer overflow in RealNetworks RealServer administration utility allows remote attackers to execute arbitrary commands via a long username and password.

7.2% 1999-11-04
N/A

FTGate web interface server allows remote attackers to read files via a .. (dot dot) attack.

3.6% 1999-11-04
N/A

Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port.

0.7% 1999-11-04
N/A

Buffer overflow in BFTelnet allows remote attackers to cause a denial of service via a long username.

4.0% 1999-11-03
N/A

Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.

0.9% 1999-11-03
N/A

Buffer overflow in IBM HomePagePrint 1.0.7 for Windows98J allows a malicious Web site to execute arbitrary code on a viewer's system via a long IMG_SRC HTML tag.

4.6% 1999-11-02
N/A

Buffer overflow in canuum program for Canna input system allows local users to gain root privileges.

0.4% 1999-11-02
N/A

Buffer overflow in uum program for Canna input system allows local users to gain root privileges.

0.4% 1999-11-02
N/A

AN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow remote attackers to execute commands via shell metacharacters.

6.2% 1999-11-02
N/A

Buffer overflow in Yamaha MidiPlug via a Text variable in an EMBED tag.

5.8% 1999-11-02
N/A

runtar in the Amanda backup system used in various UNIX operating systems executes tar with root privileges, which allows a user to overwrite or read arbitrary files by providing the target files to runtar.

0.1% 1999-11-01
N/A

Idle locking function in MacOS 9 allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock.

0.1% 1999-11-01