Filtered by vendor Ncsa Subscriptions
Total 8 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2011-0738 2 Globus, Ncsa 2 Globus Toolkit, Myproxy 2024-11-21 N/A
MyProxy 5.0 through 5.2, as used in Globus Toolkit 5.0.0 through 5.0.2, does not properly verify the (1) hostname or (2) identity in the X.509 certificate for the myproxy-server, which allows remote attackers to spoof the server and conduct man-in-the-middle (MITM) attacks via a crafted certificate when executing (a) myproxy-logon or (b) myproxy-get-delegation.
CVE-2005-0469 2 Ncsa, Redhat 2 Telnet, Enterprise Linux 2024-11-21 N/A
Buffer overflow in the slc_add_reply function in various BSD-based Telnet clients, when handling LINEMODE suboptions, allows remote attackers to execute arbitrary code via a reply with a large number of Set Local Character (SLC) commands.
CVE-2005-0468 2 Ncsa, Redhat 2 Telnet, Enterprise Linux 2024-11-21 N/A
Heap-based buffer overflow in the env_opt_add function in telnet.c for various BSD-based Telnet clients allows remote attackers to execute arbitrary code via responses that contain a large number of characters that require escaping, which consumers more memory than allocated.
CVE-1999-1090 1 Ncsa 1 Telnet 2024-11-21 N/A
The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files.
CVE-1999-0267 1 Ncsa 1 Ncsa Httpd 2024-11-21 N/A
Buffer overflow in NCSA HTTP daemon v1.3 allows remote command execution.
CVE-1999-0235 1 Ncsa 1 Ncsa Web Server 2024-11-21 N/A
Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access.
CVE-1999-0146 1 Ncsa 2 Campas, Servers 2024-11-21 N/A
The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file.
CVE-1999-0067 2 Apache, Ncsa 2 Http Server, Ncsa Httpd 2024-11-21 N/A
phf CGI program allows remote command execution through shell metacharacters.