| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters. |
| The printers program in IRIX has a buffer overflow that gives root access to local users. |
| Buffer overflow in ffbconfig in Solaris 2.5.1. |
| Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm. |
| Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. |
| SGI IRIX buffer overflow in xterm and Xaw allows root access. |
| swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access. |
| Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death. |
| Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access. |
| fm_fls license server for Adobe Framemaker allows local users to overwrite arbitrary files and gain root access. |
| vold in Solaris 2.x allows local users to gain root access. |
| admintool in Solaris allows a local user to write to arbitrary files and gain root access. |
| Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access. |
| The dip program on many Linux systems allows local users to gain root access via a buffer overflow. |
| The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access. |
| Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access. |
| Denial of service in RAS/PPTP on NT systems. |
| Java Bytecode Verifier allows malicious applets to execute arbitrary commands as the user of the applet. |
| The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts. |
| Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys. |