RPMMail before 1.4 allows remote attackers to execute commands via an e-mail message with shell metacharacters in the "MAIL FROM" command.
Max CVSS
10.0
EPSS Score
0.99%
Published
1999-10-04
Updated
2017-10-10
Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.
Max CVSS
10.0
EPSS Score
1.34%
Published
1999-10-22
Updated
2008-09-09
Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
Max CVSS
10.0
EPSS Score
4.53%
Published
1999-10-28
Updated
2008-09-09
IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.
Max CVSS
10.0
EPSS Score
0.38%
Published
1999-10-24
Updated
2022-08-17
Buffer overflow in OpenLink 3.2 allows remote attackers to gain privileges via a long GET request to the web configurator.
Max CVSS
10.0
EPSS Score
4.53%
Published
1999-10-15
Updated
2008-09-09
Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.
Max CVSS
10.0
EPSS Score
1.22%
Published
1999-10-25
Updated
2018-05-03
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file.
Max CVSS
10.0
EPSS Score
4.53%
Published
1999-10-01
Updated
2022-08-17
Hybrid Network cable modems do not include an authentication mechanism for administration, allowing remote attackers to compromise the system through the HSMP protocol.
Max CVSS
10.0
EPSS Score
3.64%
Published
1999-10-06
Updated
2008-09-09
The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.
Max CVSS
9.3
EPSS Score
0.81%
Published
1999-10-21
Updated
2021-07-23
9 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!