radar

ONE Sentinel

shield

CVE Tracker

159,349 total CVEs

Live vulnerability feed from the National Vulnerability Database

5.0

An incorrect configuration of the Order Form 1.0 shopping cart CGI program could disclose private information.

2.1

Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.

5.0

Internet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client.

5.0

The Webcom CGI Guestbook programs wguest.exe and rguest.exe allow a remote attacker to read arbitrary files using the "template" parameter.

4.6

Local users can gain privileges using the debug utility in the MPE/iX operating system.

5.0

In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.

10.0

Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.

5.0

Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time.

7.5

XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.

5.0

FrontPage Personal Web Server (PWS) allows remote attackers to read files via a .... (dot dot) attack.

7.5

Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\Catalogs subkey of the AllowedPaths registry key, whose permissions allows local and remote users to obtain the physical paths of directories that are being indexed.

7.2

The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs.

5.0

Denial of service in "poll" in OpenBSD.

7.5

OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.

5.0

OpenBSD kernel crash through TSS handling, as caused by the crashme program.

4.6

XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.

6.4

talkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes.

2.1

talkback in Netscape 4.5 allows a local user to overwrite arbitrary files of another user whose Netscape crashes.

7.2

suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.

4.6

In some cases, NetBSD 1.3.3 mount allows local users to execute programs in some file systems that have the "noexec" flag set.

7.2

During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.

7.2

umapfs allows local users to gain root privileges by changing their uid through a malicious mount_umap program.

7.2

The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges.

5.0

Auto-update feature of Macromedia Shockwave 7 transmits a user's password and hard disk information back to Macromedia.

5.0

Vulnerability in Cisco 7xx series routers allows a remote attacker to cause a system reload via a TCP connection to the router's TELNET port.

Showing 158401-158425 of 159,349 CVEs