Remote access in AIX innd 1.5.1, using control messages.
In older versions of Sendmail, an attacker could use a pipe character to execute root commands.
NFS allows users to use a "cd .." command to access other directories besides the exported file system.
Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list.
Denial of service in syslog by sending it a large number of superfluous messages.
FormMail CGI program can be used by web servers other than the host server that the program resides on.
Buffer overflow in the win-c-sample program (win-c-sample.exe) in the WebSite web server 1.1e allows remote attackers to execute arbitrary code via a ...
Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
in.rshd allows users to login with a NULL username and execute commands.
A quote cwd command on FTP servers can reveal the full path of the home directory of the "ftp" user.
The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands.
Sendmail 8.6.9 allows remote attackers to execute root commands, using ident.
Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems.
ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs.
Windows NT RSHSVC program allows remote users to execute arbitrary commands.
Denial of service in talk program allows remote attackers to disrupt a user's display.
Buffer overflow in listserv allows arbitrary command execution.
IIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL.
ICMP redirect messages may crash or lock up a host.
Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made.
Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems.
A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
NETBIOS share information may be published through SNMP registry keys in NT.
A Windows NT local user or administrator account has a guessable password.
A Windows NT local user or administrator account has a default, null, blank, or missing password.
A router or firewall allows source routed packets from arbitrary hosts.
IP forwarding is enabled on a machine which is not a router or firewall.
An SNMP community name is the default (e.g. public), null, or missing.
A NETBIOS/SMB share password is guessable.
A NETBIOS/SMB share password is the default, null, or missing.
An NIS domain name is easily guessable.
IP traceroute is allowed from arbitrary hosts.
A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Per...
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.
A router's routing tables can be obtained from arbitrary hosts.
The registry in Windows NT can be accessed remotely by users who are not administrators.
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Right...
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
A version of rusers is running that exposes valid user information to any entity on the network.
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to...
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
movemail in HP-UX 10.20 has insecure permissions, which allows local users to gain privileges.
Vulnerability in Glance programs in GlancePlus for HP-UX 10.20 and earlier allows local users to access arbitrary files and gain privileges.
Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges.
Csetup under IRIX allows arbitrary file creation or overwriting.
Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.
wu-ftp allows files to be overwritten via the rnfr command.
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
Buffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0].
MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4.
Certain files in MPower in HP-UX 10.x are installed with insecure permissions, which allows local users to gain privileges.