radar

ONE Sentinel

shield

CVE Tracker

142,635 total CVEs

Live vulnerability feed from the National Vulnerability Database

6.4

The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack.

7.2

Certain files in MPower in HP-UX 10.x are installed with insecure permissions, which allows local users to gain privileges.

10.0

MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4.

7.2

Buffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0].

10.0

Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.

5.0

wu-ftp allows files to be overwritten via the rnfr command.

7.2

Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.

7.2

Csetup under IRIX allows arbitrary file creation or overwriting.

4.6

Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges.

7.2

Vulnerability in Glance programs in GlancePlus for HP-UX 10.20 and earlier allows local users to access arbitrary files and gain privileges.

4.6

movemail in HP-UX 10.20 has insecure permissions, which allows local users to gain privileges.

7.2

Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.

4.6

netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.

0.0

A version of rusers is running that exposes valid user information to any entity on the network.

5.0

A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.

7.5

A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.

7.5

A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.

9.3

.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.

7.5

The registry in Windows NT can be accessed remotely by users who are not administrators.

7.5

A router's routing tables can be obtained from arbitrary hosts.

10.0

A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.

4.6

A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input.

0.0

IP traceroute is allowed from arbitrary hosts.

7.2

An NIS domain name is easily guessable.

7.5

A NETBIOS/SMB share password is the default, null, or missing.

Showing 142401-142425 of 142,635 CVEs