Vulnerabilities (CVE)

Filtered by CWE-16
Total 267 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-1999-0766 1 Microsoft 2 Internet Explorer, Java Virtual Machine 2024-02-28 9.3 HIGH N/A
The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.
CVE-2002-2331 1 Cascadesoft 1 W3mail 2024-02-28 5.8 MEDIUM N/A
W3Mail 1.0.2 through 1.0.5 with server side scripting (SSI) enabled in the attachments directory does not properly restrict the types of files that can be uploaded as attachments, which allows remote attackers to execute arbitrary code by sending code in MIME attachments, then requesting the attachments.
CVE-2003-1367 1 Great Circle Associates 1 Majordomo 2024-02-28 7.8 HIGH N/A
The which_access variable for Majordomo 2.0 through 1.94.4, and possibly earlier versions, is set to "open" by default, which allows remote attackers to identify the email addresses of members of mailing lists via a "which" command.
CVE-2002-2285 1 Broadcom 1 Inoculateit 2024-02-28 4.3 MEDIUM N/A
eTrust InoculateIT 6.0 with the "Incremental Scan" option enabled may certify that a file is free of viruses before the file has been completely downloaded, which allows remote attackers to bypass virus detection.
CVE-2003-1426 1 Cpanel 1 Cpanel 2024-02-28 3.3 LOW N/A
Openwebmail in cPanel 5.0, when run using suid Perl, adds the directory in the SCRIPT_FILENAME environment variable to Perl's @INC include array, which allows local users to execute arbitrary code by modifying SCRIPT_FILENAME to reference a directory containing a malicious openwebmail-shared.pl executable.
CVE-2002-2335 1 John Drake 1 Killer Protection 2024-02-28 5.0 MEDIUM N/A
Killer Protection 1.0 stores the vars.inc include file under the web root with insufficient access control, which allows remote attackers to obtain user names and passwords and log in using protection.php.
CVE-2003-1491 1 Kerio 1 Personal Firewall 2024-02-28 7.5 HIGH N/A
Kerio Personal Firewall (KPF) 2.1.4 has a default rule to accept incoming packets from DNS (UDP port 53), which allows remote attackers to bypass the firewall filters via packets with a source port of 53.