CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 94477 CVEs

CVE ID Severity Description EPSS Published
N/A

The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.

0.1% 1996-06-26
N/A

Vulnerability in a kernel error handling routine in SCO OpenServer 5.0.2 and earlier, and SCO Internet FastStart 1.0, allows local users to gain root privileges.

0.2% 1996-06-07
N/A

nettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information.

0.3% 1996-06-07
N/A

Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.

1.9% 1996-05-29
N/A

The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate.

0.1% 1996-05-28
N/A

Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands.

0.1% 1996-05-23
N/A

Vulnerability in union file system in FreeBSD 2.2 and earlier, and possibly other operating systems, allows local users to cause a denial of service (system reload) via a series of certain mount_union commands.

0.1% 1996-05-17
N/A

Delete or create a file via rpc.statd, due to invalid information.

1.1% 1996-04-24
N/A

pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.

0.1% 1996-04-18
N/A

dxconsole in DEC OSF/1 3.2C and earlier allows local users to read arbitrary files by specifying the file with the -file parameter.

0.0% 1996-04-03
N/A

test-cgi program allows an attacker to list files on the server.

85.2% 1996-04-01
N/A

Java Bytecode Verifier allows malicious applets to execute arbitrary commands as the user of the applet.

0.1% 1996-03-29
N/A

phf CGI program allows remote command execution through shell metacharacters.

90.0% 1996-03-20
N/A

The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts.

0.5% 1996-03-01
N/A

IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files.

30.8% 1996-02-25
N/A

Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys.

0.1% 1996-02-21
N/A

Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm.

43.7% 1996-02-08
N/A

abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program.

0.6% 1996-02-02
N/A

Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations.

0.7% 1996-01-03
N/A

rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter.

0.1% 1996-01-02
N/A

rpc.ypupdated (NIS) allows remote users to execute arbitrary commands.

44.9% 1995-12-12
N/A

vhe_u_mnt program in HP-UX allows local users to create root files through symlinks.

0.1% 1995-12-01
N/A

Buffer overflow in Linux splitvt command gives root access to local users.

0.1% 1995-12-01
N/A

Race condition in Linux mailx command allows local users to read user files.

0.1% 1995-12-01
N/A

Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command.

1.5% 1995-11-30
N/A

Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm.

2.5% 1995-11-01
N/A

Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.

1.4% 1995-10-19
N/A

Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.

0.3% 1995-10-13
N/A

Livingston portmaster machines could be rebooted via a series of commands.

0.5% 1995-10-01
N/A

Some configurations of NIS+ in Linux allowed attackers to log in as the user "+".

0.1% 1995-09-07
N/A

The ghostscript command with the -dSAFER option allows remote attackers to execute commands.

0.8% 1995-08-31
N/A

A race condition in the Solaris ps command allows an attacker to overwrite critical files.

0.1% 1995-08-29
N/A

SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.

0.7% 1995-08-23
N/A

In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program.

0.5% 1995-08-17
N/A

FormMail CGI program allows remote execution of commands.

1.6% 1995-08-02
N/A

In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.

0.5% 1995-07-31
9.8 CRITICAL

AnyForm CGI remote execution.

12.4% 1995-07-31
N/A

rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf.

0.1% 1995-05-10
N/A

The SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access.

0.5% 1995-04-03
N/A

SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges.

0.7% 1995-03-03
N/A

Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing.

1.2% 1995-03-03
N/A

Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.

0.7% 1995-03-01
N/A

Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access.

3.3% 1995-02-17
N/A

Buffer overflow in NCSA WebServer (version 1.5c) gives remote access.

0.5% 1995-02-01
N/A

Predictable TCP sequence numbers allow spoofing.

12.1% 1995-01-01
N/A

rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request.

6.6% 1994-12-19
N/A

Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.

0.1% 1994-11-30
N/A

Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access.

0.1% 1994-11-30
N/A

Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access.

0.1% 1994-11-30
N/A

Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.

0.1% 1994-11-30