radar

ONE Sentinel

shield

CVE Tracker

142,679 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.2

spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed.

5.0

Vulnerability in CGI program in the Lasso application by Blue World, as used on WebSTAR and other servers, allows remote attackers to read arbitrary files.

5.0

DNS cache poisoning via BIND, by predictable query IDs.

7.5

The DG/UX finger daemon allows remote command execution through shell metacharacters.

2.1

Internet Explorer 3 records a history of all URL's that are visited by a user in DAT files located in the Temporary Internet Files and History folders, which are not cleared when the user selects the "Clear History" option, and are not visible when the user browses the folders because of tailored displays.

5.1

Java in Netscape 4.5 does not properly restrict applets from connecting to other hosts besides the one from which the applet was loaded, which violates the Java security model and could allow remote attackers to conduct unauthorized activities.

5.0

An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.

2.1

ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.

7.2

Buffer overflow in SunOS/Solaris ps command.

10.0

php.cgi allows attackers to read any file on the system.

4.6

Certain programs in HP-UX 10.20 do not properly handle large user IDs (UID) or group IDs (GID) over 60000, which could allow local users to gain privileges.

7.2

Buffer overflow in nss_nisplus.so.1 library in NIS+ in Solaris 2.3 and 2.4 allows local users to gain root privileges.

4.6

The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.

5.0

Oracle Webserver 2.1, when serving PL/SQL stored procedures, allows remote attackers to cause a denial of service via a long HTTP GET request.

7.2

Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file.

7.2

Buffer overflow in ping in AIX 4.2 and earlier allows local users to gain root privileges via a long command line argument.

7.5

Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands.

7.2

Buffer overflow in AIX lchangelv gives root access.

7.2

Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.

7.2

root privileges via buffer overflow in xlock command on SGI IRIX systems.

8.4

root privileges via buffer overflow in ordist command on SGI IRIX systems.

7.2

root privileges via buffer overflow in login/scheme command on SGI IRIX systems.

7.2

root privileges via buffer overflow in eject command on SGI IRIX systems.

4.6

root privileges via buffer overflow in pset command on SGI IRIX systems.

7.2

root privileges via buffer overflow in df command on SGI IRIX systems.

Showing 142326-142350 of 142,679 CVEs