| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| A version of rusers is running that exposes valid user information to any entity on the network. |
| Cross-site scripting (XSS) vulnerability in index.php in Orbitcoders OrbitMATRIX 1.0 allows remote attackers to inject arbitrary web script or HTML via the page_name parameter with an IMG tag containing a javascript URI in the SRC attribute. |
| The rexd service is running, which uses weak authentication that can allow an attacker to execute commands. |
| The ident/identd service is running. |
| index.php in Orbitcoders OrbitMATRIX 1.0 allows remote attackers to obtain sensitive information (partial database schema) via a modified page_name parameter, which reflects portions of an SQL query in the result. NOTE: it is not clear whether the information is target-specific. If not, then this issue is not an exposure. |
| Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death. |
| The NT Alerter and Messenger services are running. |
| The RPC portmapper service is running. |
| The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
| The echo service is running. |
| IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page. |
| Buffer overflow in the HTTP protocol parser for Microsoft Network Monitor (Netmon) allows remote attackers to execute arbitrary commands via malformed data, aka the "Netmon Protocol Parsing" vulnerability. |
| The discard service is running. |
| Directory traversal vulnerability in pm.php in Phorum 5 allows remote authenticated users to include and execute arbitrary local files via directory traversal sequences in the GLOBALS[template] parameter, as demonstrated by injecting PHP sequences into a log file, which is then included by pm.php. |
| The systat service is running. |
| The Gopher service is running. |
| Cross-site scripting (XSS) vulnerability in Phorum 5.1.14 allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. |
| The UUCP service is running. |
| The rsh/rlogin service is running. |
| Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. |