CVE Tracker
159,430 total CVEsLive vulnerability feed from the National Vulnerability Database
FTGate web interface server allows remote attackers to read files via a .. (dot dot) attack.
Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port.
Buffer overflow in BFTelnet allows remote attackers to cause a denial of service via a long username.
Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL.
Buffer overflow in IBM HomePagePrint 1.0.7 for Windows98J allows a malicious Web site to execute arbitrary code on a viewer's system via a long IMG_SRC HTML tag.
Buffer overflow in canuum program for Canna input system allows local users to gain root privileges.
Buffer overflow in uum program for Canna input system allows local users to gain root privileges.
AN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow remote attackers to execute commands via shell metacharacters.
Buffer overflow in Yamaha MidiPlug via a Text variable in an EMBED tag.
runtar in the Amanda backup system used in various UNIX operating systems executes tar with root privileges, which allows a user to overwrite or read arbitrary files by providing the target files to runtar.
Idle locking function in MacOS 9 allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock.
Ultimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to view the data if an error occurs when the HTTP server attempts to execute the file.
Buffer overflow in SCO UnixWare Xsco command via a long argument.
HP Secure Web Console uses weak encryption.
By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing.
Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn't warn the user that the template contains executable content. Also applies to Outlook when the client views a malicious email message.
Buffer overflow in HHOpen ActiveX control (hhopen.ocx) 1.0.0.1 for Internet Explorer 4.01 and 5 allows remote attackers to execute arbitrary commands via long arguments to the OpenHelp method.
Buffer overflow in Skyfull mail server via MAIL FROM command.
Netscape Messaging Server 3.54, 3.55, and 3.6 allows a remote attacker to cause a denial of service (memory exhaustion) via a series of long RCPT TO commands.
Netscape Communicator 4.7 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long certificate key.
Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
URL Live! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Falcon web server allows remote attackers to determine the absolute path of the web root via long file names.
LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.
Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session.
Showing 158126-158150 of 159,430 CVEs