radar

ONE Sentinel

shield

CVE Tracker

121,272 total CVEs

Live vulnerability feed from the National Vulnerability Database

10.0

Oracle Webserver 2.1 and earlier runs setuid root, but the configuration file is owned by the oracle account, which allows any local or remote attacker who obtains access to the oracle account to gain privileges or modify arbitrary files by modifying the configuration file.

6.2

Race condition in xterm allows local users to modify arbitrary files via the logging option.

7.2

The NeXT NetInfo _writers property allows local users to gain root privileges or conduct a denial of service.

10.0

The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.

2.1

The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID.

5.0

Remote attackers can cause a denial of service in FTP by issuing multiple PASV commands, causing the server to run out of available ports.

4.6

Lotus cc:Mail release 8 stores the postoffice password in plaintext in a hidden file which has insecure permissions, which allows local users to gain privileges.

7.2

Character-Terminal User Environment (CUE) in HP-UX 11.0 and earlier allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the IOERROR.mytty file.

4.6

HP-UX 9.x and 10.x running X windows may allow local attackers to gain privileges via (1) vuefile, (2) vuepad, (3) dtfile, or (4) dtpad, which do not authenticate users.

7.5

Remote execution of arbitrary commands through Guestbook CGI program.

6.4

IIS newdsn.exe CGI script allows remote users to overwrite files.

6.4

Linux implementations of TFTP would allow access to files outside the restricted directory.

7.5

The uploader program in the WebSite web server allows a remote attacker to execute arbitrary programs.

7.5

The handler CGI program in IRIX allows arbitrary command execution.

7.2

AIX bugfiler program allows local users to gain root access.

7.5

Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.

5.0

rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.

7.5

Majordomo 1.94.3 and earlier allows remote attackers to execute arbitrary commands when the advertise or noadvertise directive is used in a configuration file, via shell metacharacters in the Reply-To header.

7.2

spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed.

5.0

Vulnerability in CGI program in the Lasso application by Blue World, as used on WebSTAR and other servers, allows remote attackers to read arbitrary files.

5.0

DNS cache poisoning via BIND, by predictable query IDs.

7.5

The DG/UX finger daemon allows remote command execution through shell metacharacters.

2.1

Internet Explorer 3 records a history of all URL's that are visited by a user in DAT files located in the Temporary Internet Files and History folders, which are not cleared when the user selects the "Clear History" option, and are not visible when the user browses the folders because of tailored displays.

5.1

Java in Netscape 4.5 does not properly restrict applets from connecting to other hosts besides the one from which the applet was loaded, which violates the Java security model and could allow remote attackers to conduct unauthorized activities.

5.0

An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.

Showing 120901-120925 of 121,272 CVEs