radar

ONE Sentinel

shield

CVE Tracker

121,732 total CVEs

Live vulnerability feed from the National Vulnerability Database

5.0

LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.

4.6

Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session.

7.5

genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.

5.0

Falcon web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

5.0

The Zeus web server administrative interface uses weak encryption for its passwords.

10.0

Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.

10.0

IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.

7.2

ypserv allows local administrators to modify password tables.

7.2

ypserv allows a local user to modify the GECOS and login shells of other users.

7.2

Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation.

6.2

Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory.

7.2

Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges.

4.6

Linux kernel before 2.3.18 or 2.2.13pre15, with SLIP and PPP options, allows local unprivileged users to forge IP packets via the TIOCSETD option on tty devices.

10.0

Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.

7.6

Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.

5.0

Denial of service in Axent Raptor firewall via malformed zero-length IP options.

9.3

The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.

7.5

Firewall-1 does not properly restrict access to LDAP attributes.

7.5

When BSDI patches for Gauntlet 5.0 BSDI are installed in a particular order, Gauntlet allows remote attackers to bypass firewall access restrictions, and does not log the activities.

5.0

ICQ ActiveList Server allows remote attackers to cause a denial of service (crash) via malformed packets to the server's UDP port.

10.0

Buffer overflow in OpenLink 3.2 allows remote attackers to gain privileges via a long GET request to the web configurator.

4.6

Pluggable Authentication Modules (PAM) in Red Hat Linux 6.1 does not properly lock access to disabled NIS accounts.

5.0

HTTP server for Xerox DocuColor 4 LP allows remote attackers to cause a denial of service (hang) via a long URL that contains a large number of . characters.

2.1

userOsa in SCO OpenServer allows local users to corrupt files via a symlink attack.

5.0

The IDENT server in Caldera Linux 2.3 creates multiple threads for each IDENT request, which allows remote attackers to cause a denial of service.

Showing 120451-120475 of 121,732 CVEs