Search

Search Results (344930 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-1999-0097 3 Hp, Ibm, Sun 4 Hp-ux, Aix, Solaris and 1 more 2026-04-16 N/A
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
CVE-2006-3226 1 Cisco 1 Secure Access Control Server 2026-04-16 N/A
Cisco Secure Access Control Server (ACS) 4.x for Windows uses the client's IP address and the server's port number to grant access to an HTTP server port for an administration session, which allows remote attackers to bypass authentication via various methods, aka "ACS Weak Session Management Vulnerability."
CVE-1999-0098 3 Apple, Pmail, Seattlelab 3 Appleshare, Mercury Mail Server, Slmail 2026-04-16 N/A
Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activities.
CVE-1999-1111 1 Immunix 1 Stackguard 2026-04-16 N/A
Vulnerability in StackGuard before 1.21 allows remote attackers to bypass the Random and Terminator Canary security mechanisms by using a non-linear attack which directly modifies a pointer to a return address instead of using a buffer overflow to reach the return address entry itself.
CVE-1999-0099 5 Bsdi, Convex, Cray and 2 more 7 Bsd Os, Convexos, Spp-ux and 4 more 2026-04-16 N/A
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.
CVE-1999-1112 1 Irfanview 1 Irfanview 2026-04-16 N/A
Buffer overflow in IrfanView32 3.07 and earlier allows attackers to execute arbitrary commands via a long string after the "8BPS" image type in a Photo Shop image header.
CVE-1999-0100 1 Isc 1 Inn 2026-04-16 N/A
Remote access in AIX innd 1.5.1, using control messages.
CVE-1999-0101 1 Ibm 1 Aix 2026-04-16 N/A
Buffer overflow in AIX and Solaris "gethostbyname" library call allows root access through corrupt DNS host names.
CVE-1999-1117 1 Ibm 1 Aix 2026-04-16 N/A
lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.
CVE-1999-0102 1 Seattle Lab Software 1 Slmail 2026-04-16 N/A
Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line.
CVE-1999-1119 1 Ibm 1 Aix 2026-04-16 N/A
FTP installation script anon.ftp in AIX insecurely configures anonymous FTP, which allows remote attackers to execute arbitrary commands.
CVE-2000-0721 1 Multisoft 1 Flagship 2026-04-16 N/A
The FSserial, FlagShip_c, and FlagShip_p programs in the FlagShip package are installed world-writeable, which allows local users to replace them with Trojan horses.
CVE-1999-0104 4 Caldera, Hp, Microsoft and 1 more 5 Openlinux, Hp-ux, Windows 95 and 2 more 2026-04-16 N/A
A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2.
CVE-1999-0105 2026-04-16 N/A
finger allows recursive searches by using a long string of @ symbols.
CVE-1999-1120 1 Sgi 1 Irix 2026-04-16 N/A
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
CVE-2000-0723 1 Helix Code 1 Gnome Installer 2026-04-16 N/A
Helix GNOME Updater helix-update 0.5 and earlier does not properly create /tmp directories, which allows local users to create empty system configuration files such as /etc/config.d/bashrc, /etc/config.d/csh.cshrc, and /etc/rc.config.
CVE-1999-0106 2026-04-16 N/A
Finger redirection allows finger bombs.
CVE-1999-1121 1 Ibm 1 Aix 2026-04-16 N/A
The default configuration for UUCP in AIX before 3.2 allows local users to gain root privileges.
CVE-2000-0724 1 Helix Code 1 Go-gnome Pre-installer 2026-04-16 N/A
The go-gnome Helix GNOME pre-installer allows local users to overwrite arbitrary files via a symlink attack on various files in /tmp, including uudecode, snarf, and some installer files.
CVE-2006-3227 1 Microsoft 1 Internet Explorer 2026-04-16 N/A
Interpretation conflict between Internet Explorer and other web browsers such as Mozilla, Opera, and Firefox might allow remote attackers to modify the visual presentation of web pages and possibly bypass protection mechanisms such as content filters via ASCII characters with the 8th bit set, which could be stripped by Internet Explorer to render legible text, but not when using other browsers. NOTE: there has been significant discussion about this issue, and as of 20060625, it is not clear where the responsibility for this issue lies, although it might be due to vagueness within the associated standards. NOTE: this might only be exploitable with certain encodings.