radar

ONE Sentinel

shield

CVE Tracker

121,496 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.5

In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension.

7.2

Digital Unix Networker program nsralist has a buffer overflow which allows local users to obtain root privilege.

7.2

Vulnerability in eterm 0.8.8 in Debian GNU/Linux allows an attacker to gain root privileges.

2.1

xtvscreen in SuSE Linux 6.0 allows local users to overwrite arbitrary files via a symlink attack on the pic000.pnm file.

7.2

A buffer overflow in lsof allows local users to obtain root privilege.

10.0

snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd before root runs snap -a.

5.0

Buffer overflow in Tetrix TetriNet daemon 1.13.16 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by connecting to port 31457 from a host with a long DNS hostname.

2.6

A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service.

5.0

O'Reilly WebSite 1.1e and Website Pro 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in an argument to (1) args.cmd or (2) args.bat.

7.5

Buffer overflow in webd in Network Flight Recorder (NFR) 2.0.2-Research allows remote attackers to execute commands.

2.1

Debian GNU/Linux cfengine package is susceptible to a symlink attack.

7.5

mSQL (Mini SQL) 2.0.6 allows remote attackers to obtain sensitive server information such as logged users, database names, and server version via the ServerStats query.

2.1

Vulnerability in Compaq Tru64 UNIX edauth command.

7.5

Buffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution.

5.0

Multilink PPP for ISDN dialup users in Ascend before 4.6 allows remote attackers to cause a denial of service via a spoofed endpoint identifier.

2.1

The installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted.

5.0

FileSystemObject (FSO) in the showfile.asp Active Server Page (ASP) allows remote attackers to read arbitrary files by specifying the name in the file parameter.

1.2

Lynx allows a local user to overwrite sensitive files through /tmp symlinks.

4.6

In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files.

9.3

rpc.pcnfsd in HP gives remote root access by changing the permissions on the main printer spool directory.

10.0

By default, IIS 4.0 has a virtual directory /IISADMPWD which contains files that can be used as proxies for brute force password attacks, or to identify valid users on the system.

10.0

Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.

2.1

NetBSD netstat command allows local users to access kernel memory.

7.5

In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value.

6.2

Race condition in the db_loader program in ClearCase gives local users root access by setting SUID bits.

Showing 120626-120650 of 121,496 CVEs