radar

ONE Sentinel

shield

CVE Tracker

159,388 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.2

Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable.

7.5

Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable.

5.0

Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote attackers to perform spoofing and session hijacking.

5.0

Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users.

4.6

The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users.

10.0

The default configuration of kdm in Caldera and Mandrake Linux, and possibly other distributions, allows XDMCP connections from any host, which allows remote attackers to obtain sensitive information or bypass additional access restrictions.

10.0

Multiple buffer overflows in WindowMaker 0.52 through 0.60.0 allow attackers to cause a denial of service and possibly execute arbitrary commands by executing WindowMaker with a long program name (argv[0]).

10.0

Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR.

7.5

pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files.

5.1

The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.

5.0

Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files.

7.2

The Microsoft Jet database engine allows an attacker to execute commands via a database query, aka the "VBA Shell" vulnerability.

4.6

Man2html 2.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file.

7.2

Nullsoft SHOUTcast server stores the administrative password in plaintext in a configuration file (sc_serv.conf), which could allow a local user to gain administrative privileges on the server.

2.1

Trn allows local users to overwrite other users' files via symlinks.

10.0

QMS CrownNet Unix Utilities for 2060 allows root to log on without a password.

6.4

Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.

7.5

A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication.

2.1

The logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files using symbolic links.

7.1

When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page".

2.1

Denial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load.

10.0

Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.

7.5

The w3-msql CGI script provided with Mini SQL allows remote attackers to view restricted directories.

4.6

dbsnmp in Oracle Intelligent Agent allows local users to gain privileges by setting the ORACLE_HOME environmental variable, which dbsnmp uses to find the nmiconf.tcl script.

2.6

Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument.

Showing 158226-158250 of 159,388 CVEs