radar

ONE Sentinel

shield

CVE Tracker

121,916 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.5

EZShopper 3.0 search.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters.

7.5

EZShopper 3.0 loadpage.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters.

7.2

Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.

5.0

The Nautica Marlin bridge allows remote attackers to cause a denial of service via a zero length UDP packet to the SNMP port.

5.0

ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event.

5.1

The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.

4.6

FTP Explorer uses weak encryption for storing the username, password, and profile of FTP sites.

5.0

InterAccess TelnetD Server 4.0 allows remote attackers to conduct a denial of service via malformed terminal client configuration information.

7.2

setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file.

7.2

buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters.

7.2

Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt.

5.0

The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters.

5.0

The Windows Media server allows remote attackers to cause a denial of service via a series of client handshake packets that are sent in an improper sequence, aka the "Misordered Windows Media Services Handshake" vulnerability.

5.0

iPlanet Web Server 4.1 allows remote attackers to cause a denial of service via a large number of GET commands, which consumes memory and causes a kernel panic.

1.2

The lit program in Sun Flex License Manager (FlexLM) follows symlinks, which allows local users to modify arbitrary files.

10.0

Buffer overflow in the InterAccess telnet server TelnetD allows remote attackers to execute commands via a long login name.

4.6

asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file.

7.6

The Microsoft Active Setup ActiveX component in Internet Explorer 4.x and 5.x allows a remote attacker to install software components without prompting the user by stating that the software's manufacturer is Microsoft.

7.2

The installation of Sun Internet Mail Server (SIMS) creates a world-readable file that allows local users to obtain passwords.

5.1

The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability.

7.5

Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not validate an identification number, which allows remote attackers to execute SQL commands.

7.2

Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive.

7.5

HP Ignite-UX does not save /etc/passwd when it creates an image of a trusted system, which can set the password field to a blank and allow an attacker to gain privileges.

7.5

Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon.

5.1

Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability.

Showing 120201-120225 of 121,916 CVEs