radar

ONE Sentinel

shield

CVE Tracker

143,199 total CVEs

Live vulnerability feed from the National Vulnerability Database

2.1

A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.

6.2

The BSD make program allows local users to modify files via a symlink attack when the -j option is being used.

7.2

Buffer overflow in UnixWare ppptalk command allows local users to gain privileges via a long prompt argument.

5.0

Netopia Timbuktu Pro sends user IDs and passwords in cleartext, which allows remote attackers to obtain them via sniffing.

7.5

The W3C CERN httpd HTTP server allows remote attackers to determine the real pathnames of some commands via a request for a nonexistent URL.

10.0

HP VirtualVault with the PHSS_17692 patch allows unprivileged processes to bypass access restrictions via the Trusted Gateway Proxy (TGP).

3.6

VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack.

4.6

Visual Casel (Vcasel) does not properly prevent users from executing files, which allows local users to use a relative pathname to specify an alternate file which has an approved name and possibly gain privileges.

10.0

Buffer overflow in InetServ 3.0 allows remote attackers to execute commands via a long GET request.

5.0

cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to cause a denial of service via a malformed URL that includes shell metacharacters.

5.0

cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to read arbitrary files by specifying the filename in a parameter to the script.

5.0

Super Mail Transfer Package (SMTP), later called MsgCore, has a memory leak which allows remote attackers to cause a denial of service by repeating multiple HELO, MAIL FROM, RCPT TO, and DATA commands in the same session.

5.0

WebSite Pro allows remote attackers to determine the real pathname of webdirectories via a malformed URL request.

5.0

Netscape Mail Notification (nsnotify) utility in Netscape Communicator uses IMAP without SSL, even if the user has set a preference for Communicator to use an SSL connection, allowing a remote attacker to sniff usernames and passwords in plaintext.

7.2

NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request."

7.2

get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program.

5.0

Netscape Navigator uses weak encryption for storing a user's Netscape mail password.

7.5

PowerScripts PlusMail CGI program allows remote attackers to execute commands via a password file with improper permissions.

5.0

IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions.

2.1

CyberCash Merchant Connection Kit (MCK) allows local users to modify files via a symlink attack.

6.4

MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege.

10.0

Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute the code by using hexadecimal codes to specify the javascript: protocol, e.g. jAvascript.

2.1

AIX techlibss allows local users to overwrite files via a symlink attack.

7.5

Buffer overflow in ICQ 99b 1.1.1.1 client allows remote attackers to execute commands via a malformed URL within an ICQ message.

10.0

The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.

Showing 141576-141600 of 143,199 CVEs