N/A
A Unix account with a name other than "root" has UID 0, i.e. root privileges.
0.5%
1999-01-01
N/A
NFS exports system-critical data to the world, e.g. / or a password file.
25.3%
1999-01-01
N/A
Windows NT automatically logs in an administrator upon rebooting.
0.4%
1999-01-01
N/A
A superfluous NFS server is running, but it is not importing or exporting any file systems.
0.2%
1999-01-01
N/A
An SSH server allows authentication through the .rhosts file.
0.4%
1999-01-01
N/A
A trust relationship exists between two Unix hosts.
0.5%
1999-01-01
N/A
A system is operating in "promiscuous" mode which allows it to perform packet sniffing.
0.5%
1999-01-01
N/A
A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc.
0.5%
1999-01-01
N/A
A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.
0.5%
1999-01-01
N/A
The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.
0.4%
1999-01-01
N/A
ICMP echo (ping) is allowed from arbitrary hosts.
0.6%
1999-01-01
N/A
A system-critical NETBIOS/SMB share has inappropriate access control.
1.2%
1999-01-01
N/A
An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv.
0.5%
1999-01-01
N/A
A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.
0.4%
1999-01-01
N/A
Anonymous FTP is enabled.
0.6%
1999-01-01
N/A
A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.
1.3%
1999-01-01
N/A
Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.
1.3%
1999-01-01
N/A
A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.
1.2%
1999-01-01
N/A
An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
0.9%
1999-01-01
N/A
A service or application has a backdoor password that was placed there by the developer.
0.5%
1999-01-01
N/A
IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
61.9%
1999-01-01
N/A
A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files.
0.1%
1999-01-01
N/A
The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands.
0.8%
1999-01-01
N/A
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
0.1%
1999-01-01
N/A
The demo version of the Quakenbush NT Password Appraiser sends passwords across the network in plaintext.
0.5%
1999-01-01
N/A
A race condition in the BackWeb Polite Agent Protocol allows an attacker to spoof a BackWeb server.
0.5%
1999-01-01
N/A
DPEC Online Courseware allows an attacker to change another user's password without knowing the original password.
0.5%
1999-01-01
N/A
Remote attackers can cause a denial of service in Sendmail 8.8.x and 8.9.2 by sending messages with a large number of headers.
6.0%
1999-01-01
N/A
DataLynx suGuard trusts the PATH environment variable to execute the ps command, allowing local users to execute commands as root.
0.2%
1999-01-01
N/A
The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content.
0.3%
1999-01-01
N/A
Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data.
11.7%
1999-01-01
N/A
NetWare version of LaserFiche stores usernames and passwords unencrypted, and allows administrative changes without logging.
0.5%
1999-01-01
N/A
Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service.
0.7%
1999-01-01
N/A
In some NT web servers, appending a space at the end of a URL may allow attackers to read source code for active pages.
0.5%
1999-01-01
N/A
Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection.
13.4%
1999-01-01
N/A
The Java Web Server would allow remote users to obtain the source code for CGI programs.
4.3%
1999-01-01
N/A
mSQL v2.0.1 and below allows remote execution through a buffer overflow.
1.9%
1999-01-01
N/A
MetaInfo MetaWeb web server allows users to upload, execute, and read scripts.
2.8%
1999-01-01
N/A
Buffer overflow in ircd allows arbitrary command execution.
1.1%
1999-01-01
N/A
A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials.
0.4%
1999-01-01
N/A
Linux cfingerd could be exploited to gain root access.
0.5%
1999-01-01
N/A
Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy.
0.5%
1999-01-01
N/A
Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access.
0.5%
1999-01-01
N/A
Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service.
11.7%
1999-01-01
N/A
Attackers can do a denial of service of IRC by crashing the server.
0.5%
1999-01-01
N/A
Denial of service in Sendmail 8.6.11 and 8.6.12.
0.5%
1999-01-01
N/A
Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password.
0.5%
1999-01-01
N/A
finger .@host on some systems may print information on some user accounts.
0.5%
1999-01-01
N/A
finger 0@host on some systems may print information on some user accounts.
0.5%
1999-01-01
N/A
SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.
0.1%
1998-12-29