radar

ONE Sentinel

shield

CVE Tracker

144,698 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.2

Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable.

7.2

rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rex.$$ file.

7.2

COPS 1.04 allows local users to overwrite or create arbitrary files via a symlink attack on temporary files in (1) res_diff, (2) ca.src, and (3) mail.chk.

5.0

Information from SSL-encrypted sessions via PKCS #1.

10.0

The textcounter.pl by Matt Wright allows remote attackers to execute arbitrary commands via shell metacharacters.

7.2

Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments.

5.5

FreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system.

5.0

SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote attackers to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and computing a valid CRC-32 checksum for the packet, aka the "SSH insertion attack."

7.2

Cheyenne InocuLAN Anti-Virus Server in Inoculan 4.0 before Service Pack 2 creates an update directory with "EVERYONE FULL CONTROL" permissions, which allows local users to cause Inoculan's antivirus update feature to install a Trojan horse dll.

1.2

(1) acledit and (2) aclput in AIX 4.3 allow local users to create or modify files via a symlink attack.

2.1

Macromedia Dreamweaver uses weak encryption to store FTP passwords, which could allow local users to easily decrypt the passwords of other users.

5.0

Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script.

5.0

Sun's ftpd daemon can be subjected to a denial of service.

10.0

Buffer overflow in NIS+, in Sun's rpc.nisd program.

7.5

Compaq/Microcom 6000 Access Integrator does not disconnect a client after a certain number of failed login attempts, which allows remote attackers to guess usernames or passwords via a brute force attack.

5.0

Compaq/Microcom 6000 Access Integrator does not cause a session timeout after prompting for a username or password, which allows remote attackers to cause a denial of service by connecting to the integrator without providing a username or password.

4.6

Micah Software Full Armor Network Configurator and Zero Administration allow local users with physical access to bypass the desktop protection by (1) using <CTRL><ALT><DEL> and kill the process using the task manager, (2) booting the system from a separate disk, or (3) interrupting certain processes that execute while the system is booting.

4.6

An account on a router, firewall, or other network device has a default, null, blank, or missing password.

4.6

A Unix account has a guessable password.

7.2

SGI mediad program allows local users to gain root access.

5.0

In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.

7.2

xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.

7.2

Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges.

7.2

Vulnerability in (1) diskalign and (2) diskperf in IRIX 6.4 patches 2291 and 2848 allow a local user to create root-owned files leading to a root compromise.

4.6

Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.

Showing 144151-144175 of 144,698 CVEs