CVE Tracker
144,789 total CVEsLive vulnerability feed from the National Vulnerability Database
Vulnerability in ftpd/kftpd in HP-UX 10.x and 9.x allows local and possibly remote users to gain root privileges.
IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access.
HP-UX vgdisplay program gives root access to local users.
The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Certain files in MPower in HP-UX 10.x are installed with insecure permissions, which allows local users to gain privileges.
MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4.
Buffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0].
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
wu-ftp allows files to be overwritten via the rnfr command.
Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.
Csetup under IRIX allows arbitrary file creation or overwriting.
Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges.
Vulnerability in Glance programs in GlancePlus for HP-UX 10.20 and earlier allows local users to access arbitrary files and gain privileges.
movemail in HP-UX 10.20 has insecure permissions, which allows local users to gain privileges.
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges.
A version of rusers is running that exposes valid user information to any entity on the network.
A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc.
A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories.
A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
The registry in Windows NT can be accessed remotely by users who are not administrators.
A router's routing tables can be obtained from arbitrary hosts.
A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness.
Showing 144551-144575 of 144,789 CVEs