Land IP denial of service.
Max CVSS
5.0
EPSS Score
0.15%
Published
1997-12-01
Updated
2008-09-09
Race condition in signal handling routine in ftpd, allowing read/write arbitrary files.
Max CVSS
5.1
EPSS Score
0.13%
Published
1997-05-29
Updated
2022-08-17
Denial of service of inetd on Linux through SYN and RST packets.
Max CVSS
5.0
EPSS Score
0.22%
Published
1997-11-01
Updated
2022-08-17
wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.
Max CVSS
5.0
EPSS Score
1.22%
Published
1999-01-02
Updated
2022-08-17
gpg (aka GnuPG) 1.0.4 and other versions imports both public and private keys from public key servers without notifying the user about the private keys, which could allow an attacker to break the web of trust.
Max CVSS
5.0
EPSS Score
0.23%
Published
2001-02-12
Updated
2017-10-10
Cross-site scripting vulnerability in Mailman email archiver before 2.08 allows attackers to obtain sensitive information or authentication credentials via a malicious link that is accessed by other web users.
Max CVSS
5.1
EPSS Score
0.42%
Published
2001-12-21
Updated
2017-10-10
Multiple RADIUS implementations do not properly validate the Vendor-Length of the Vendor-Specific attribute, which allows remote attackers to cause a denial of service (crash) via a Vendor-Length that is less than 2.
Max CVSS
5.0
EPSS Score
0.36%
Published
2002-03-04
Updated
2018-10-30
Directory traversal vulnerability in GNU tar 1.13.19 through 1.13.25, and possibly later versions, allows attackers to overwrite arbitrary files during archive extraction via a (1) "/.." or (2) "./.." string, which removes the leading slash but leaves the "..", a variant of CVE-2001-1267.
Max CVSS
5.0
EPSS Score
8.20%
Published
2002-10-10
Updated
2018-10-19
The BIND 4 and BIND 8.2.x stub resolver libraries, and other libraries such as glibc 2.2.5 and earlier, libc, and libresolv, use the maximum buffer size instead of the actual size when processing a DNS response, which causes the stub resolvers to read past the actual boundary ("read buffer overflow"), allowing remote attackers to cause a denial of service (crash).
Max CVSS
5.0
EPSS Score
9.78%
Published
2002-10-11
Updated
2008-09-10
GNU tar 1.13.19 and other versions before 1.13.25 allows remote attackers to overwrite arbitrary files via a symlink attack, as the result of a modification that effectively disabled the security check.
Max CVSS
5.0
EPSS Score
0.22%
Published
2002-10-28
Updated
2016-10-18
The Sun RPC functionality in multiple libc implementations does not provide a time-out mechanism when reading data from TCP connections, which allows remote attackers to cause a denial of service (hang).
Max CVSS
5.0
EPSS Score
2.88%
Published
2002-11-12
Updated
2017-10-10
Directory traversal vulnerability in wget before 1.8.2-4 allows a remote FTP server to create or overwrite files as the wget user via filenames containing (1) /absolute/path or (2) .. (dot dot) sequences.
Max CVSS
5.0
EPSS Score
4.62%
Published
2002-12-18
Updated
2018-10-19
The vty layer in Quagga before 0.96.4, and Zebra 0.93b and earlier, does not verify that sub-negotiation is taking place when processing the SE marker, which allows remote attackers to cause a denial of service (crash) via a malformed telnet command to the telnet CLI port, which may trigger a null dereference.
Max CVSS
5.0
EPSS Score
1.77%
Published
2003-12-15
Updated
2016-10-18
An integer overflow in ls in the fileutils or coreutils packages may allow local users to cause a denial of service or execute arbitrary code via a large -w value, which could be remotely exploited via applications that use ls, such as wu-ftpd.
Max CVSS
5.0
EPSS Score
0.65%
Published
2003-11-17
Updated
2008-09-10
GnuPG (GPG) 1.0.2, and other versions up to 1.2.3, creates ElGamal type 20 (sign+encrypt) keys using the same key component for encryption as for signing, which allows attackers to determine the private key from a signature.
Max CVSS
5.0
EPSS Score
1.66%
Published
2003-12-15
Updated
2017-10-11
Unknown vulnerability in the mail command handler in Mailman before 2.0.14 allows remote attackers to cause a denial of service (crash) via malformed e-mail commands.
Max CVSS
5.0
EPSS Score
1.51%
Published
2004-03-03
Updated
2017-10-10
Emacs 21.2.1 does not prompt or warn the user before executing Lisp code in the local variables section of a text file, which allows user-assisted attackers to execute arbitrary commands, as demonstrated using the mode-name variable.
Max CVSS
5.1
EPSS Score
0.76%
Published
2003-12-31
Updated
2011-03-08
The rad_print_request function in logger.c for GNU Radius daemon (radiusd) before 1.2 allows remote attackers to cause a denial of service (crash) via a UDP packet with an Acct-Status-Type attribute without a value and no Acct-Session-Id attribute, which causes a null dereference.
Max CVSS
5.0
EPSS Score
2.52%
Published
2004-03-03
Updated
2017-10-10
Mailman before 2.0.13 allows remote attackers to cause a denial of service (crash) via an email message with an empty subject field.
Max CVSS
5.0
EPSS Score
0.22%
Published
2004-06-01
Updated
2008-09-05
Mailman before 2.1.5 allows remote attackers to obtain user passwords via a crafted email request to the Mailman server.
Max CVSS
5.0
EPSS Score
0.56%
Published
2004-08-18
Updated
2017-07-11
The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID.
Max CVSS
5.0
EPSS Score
0.93%
Published
2004-12-06
Updated
2017-07-11
Integer overflow in the asn_decode_string() function defined in asn1.c in radiusd for GNU Radius 1.1 and 1.2 before 1.2.94, when compiled with the --enable-snmp option, allows remote attackers to cause a denial of service (daemon crash) via certain SNMP requests.
Max CVSS
5.0
EPSS Score
0.75%
Published
2004-12-23
Updated
2017-07-11
Multiple buffer overflows in enscript 1.6.3 allow remote attackers or local users to cause a denial of service (application crash).
Max CVSS
5.0
EPSS Score
2.33%
Published
2004-12-31
Updated
2018-10-19
wget 1.8.x and 1.9.x allows a remote malicious web server to overwrite certain files via a redirection URL containing a ".." that resolves to the IP address of the malicious server, which bypasses wget's filtering for ".." sequences.
Max CVSS
5.0
EPSS Score
0.20%
Published
2005-04-27
Updated
2018-10-03
wget 1.8.x and 1.9.x does not filter or quote control characters when displaying HTTP responses to the terminal, which may allow remote malicious web servers to inject terminal escape sequences and execute arbitrary code.
Max CVSS
5.0
EPSS Score
1.94%
Published
2005-04-27
Updated
2018-10-03
270 vulnerabilities found
1 2 3 4 5 6 7 8 9 10 11
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!