| CVE |
Vendors |
Products |
Updated |
CVSS v3.1 |
| A Windows NT file system is not NTFS. |
| A Windows NT administrator account has the default name of Administrator. |
| A network service is running on a nonstandard port. |
| A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data. |
| A filter in a router or firewall allows unusual fragmented packets. |
| A system-critical Windows NT registry key has inappropriate permissions. |
| A network intrusion detection system (IDS) does not verify the checksum on a packet. |
| Cross-site scripting (XSS) vulnerability in info2www before 1.2.2.9 allows remote attackers to inject arbitrary web script or HTML via the arguments to info2www. |
| There is a one-way or two-way trust relationship between Windows NT domains. |
| An event log in Windows NT has inappropriate access permissions. |
| A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire. |
| A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection. |
| A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers. |
| Unknown vulnerability in the rwho daemon (in.rwhod) for Solaris 7 through 9 allows remote attackers to execute arbitrary code. |
| Cross-site scripting (XSS) vulnerability in Solaris AnswerBook2 Documentation 1.4.4 and earlier allows remote attackers to inject arbitrary web script or HTML via the Search function. |
| Multiple cross-site scripting (XSS) vulnerabilities in Sawmill before 7.1.6 allow remote attackers to inject arbitrary web script or HTML via (1) the username in the Add User window or (2) the license key in the Licensing page. |
| A network intrusion detection system (IDS) does not properly reassemble fragmented packets. |
| In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc. |
| An incorrect configuration of the WebStore 1.0 shopping cart CGI program "web_store.cgi" could disclose private information. |
| quikstore.cgi in QuikStore shopping cart stores quikstore.cfg under the web document root with insufficient access control, which allows remote attackers to obtain the cleartext administrator password and gain privileges. |