CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 93561 CVEs

CVE ID Severity Description EPSS Published
N/A

Buffer overflow in University of Washington's implementation of IMAP and POP servers.

5.5% 1997-04-07
N/A

Windows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.

9.8% 1997-04-02
N/A

Buffer overflow in Solaris fdformat command gives root access to local users.

0.3% 1997-04-01
N/A

Denial of service through Winpopup using large user names.

4.9% 1997-04-01
N/A

Remote command execution in Microsoft Internet Explorer using .lnk and .url files.

2.8% 1997-04-01
N/A

Macromedia Shockwave before 6.0 allows a malicious webmaster to read a user's mail box and possibly access internal web servers via the GetNextText command on a Shockwave movie.

0.1% 1997-03-14
N/A

Vulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost.

1.3% 1997-03-05
N/A

Buffer overflow in FreeBSD lpd through long DNS hostnames.

0.5% 1997-03-05
N/A

Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument.

0.3% 1997-03-04
N/A

Internet Explorer 3.01 on Windows 95 allows remote malicious web sites to execute arbitrary commands via a .isp file, which is automatically downloaded and executed without prompting the user.

6.1% 1997-03-01
N/A

A version of finger is running that exposes valid user information to any entity on the network.

25.2% 1997-03-01
N/A

Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable.

0.1% 1997-03-01
N/A

NFS cache poisoning.

0.5% 1997-03-01
N/A

Finger redirection allows finger bombs.

0.2% 1997-03-01
N/A

finger allows recursive searches by using a long string of @ symbols.

0.1% 1997-03-01
N/A

ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.

0.2% 1997-02-20
N/A

Buffer overflow in NLS (Natural Language Service).

6.5% 1997-02-13
N/A

Buffer overflow in ffbconfig in Solaris 2.5.1.

0.9% 1997-02-10
N/A

Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.

4.6% 1997-02-07
N/A

Buffer overflow of rlogin program using TERM environmental variable.

6.9% 1997-02-06
N/A

ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack.

1.6% 1997-02-05
N/A

rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.

0.5% 1997-02-03
N/A

Vulnerability in ftpd/kftpd in HP-UX 10.x and 9.x allows local and possibly remote users to gain root privileges.

0.4% 1997-02-02
N/A

IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.

0.4% 1997-02-01
N/A

The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access.

1.1% 1997-02-01
N/A

HP-UX vgdisplay program gives root access to local users.

0.1% 1997-02-01
N/A

The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack.

8.1% 1997-02-01
N/A

Certain files in MPower in HP-UX 10.x are installed with insecure permissions, which allows local users to gain privileges.

0.0% 1997-01-30
N/A

MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4.

2.2% 1997-01-28
N/A

Buffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0].

0.1% 1997-01-27
N/A

Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.

1.9% 1997-01-27
N/A

wu-ftp allows files to be overwritten via the rnfr command.

0.7% 1997-01-11
N/A

Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.

0.0% 1997-01-09
N/A

Csetup under IRIX allows arbitrary file creation or overwriting.

0.1% 1997-01-08
N/A

Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges.

0.1% 1997-01-07
N/A

Vulnerability in Glance programs in GlancePlus for HP-UX 10.20 and earlier allows local users to access arbitrary files and gain privileges.

0.1% 1997-01-07
N/A

movemail in HP-UX 10.20 has insecure permissions, which allows local users to gain privileges.

0.1% 1997-01-06
N/A

Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.

0.2% 1997-01-06
N/A

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.

0.5% 1997-01-04
N/A

A version of rusers is running that exposes valid user information to any entity on the network.

0.6% 1997-01-01
N/A

A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.

11.6% 1997-01-01
N/A

A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.

6.6% 1997-01-01
N/A

A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.

8.7% 1997-01-01
N/A

.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.

9.0% 1997-01-01
N/A

The registry in Windows NT can be accessed remotely by users who are not administrators.

14.1% 1997-01-01
N/A

A router's routing tables can be obtained from arbitrary hosts.

0.5% 1997-01-01
N/A

A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.

11.8% 1997-01-01
N/A

A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.

0.3% 1997-01-01
N/A

IP traceroute is allowed from arbitrary hosts.

0.6% 1997-01-01
N/A

An NIS domain name is easily guessable.

0.1% 1997-01-01