radar

ONE Sentinel

shield

CVE Tracker

159,104 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.2

SGI mediad program allows local users to gain root access.

5.0

In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL.

7.2

xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.

7.2

Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges.

7.2

Vulnerability in (1) diskalign and (2) diskperf in IRIX 6.4 patches 2291 and 2848 allow a local user to create root-owned files leading to a root compromise.

4.6

Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.

7.2

Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable.

7.5

Vulnerability in man.sh CGI script, included in May 1998 issue of SysAdmin Magazine, allows remote attackers to execute arbitrary commands.

7.2

Buffer overflows in Sun libnsl allow root access.

7.5

US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the "set host prompt" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the "host: " prompt.

7.5

Check Point Firewall-1 does not properly handle certain restricted keywords (e.g., Mail, auth, time) in user-defined objects, which could produce a rule with a default "ANY" address and result in access to more systems than intended by the administrator.

10.0

A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections.

10.0

The Motorola CableRouter allows any remote user to connect to and configure the router on port 1024.

6.4

Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages.

4.6

Vulnerability in Advanced File System Utility (advfs) in Digital UNIX 4.0 through 4.0d allows local users to gain privileges.

7.2

Solaris 2.6 HW3/98 installs admintool with world-writable permissions, which allows local users to gain privileges by replacing it with a Trojan horse program.

7.2

SGI IRIX buffer overflow in xterm and Xaw allows root access.

7.5

FreeBSD T/TCP Extensions for Transactions can be subjected to spoofing attacks.

7.2

The printers program in IRIX has a buffer overflow that gives root access to local users.

7.2

Buffer overflow in kppp in KDE allows local users to gain root access via a long -c (account_name) command line argument.

7.8

Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server.

8.4

Solaris ufsrestore buffer overflow.

7.2

suidexec in suidmanager 0.18 on Debian 2.0 allows local users to gain root privileges by specifying a malicious program on the command line.

5.0

Buffer overflow in Eudora Internet Mail Server (EIMS) 2.01 and earlier on MacOS systems allows remote attackers to cause a denial of service via a long USER command to port 106.

2.1

named in ISC BIND 4.9 and 8.1 allows local users to destroy files via a symlink attack on (1) named_dump.db when root kills the process with a SIGINT, or (2) named.stats when SIGIOT is used.

Showing 158576-158600 of 159,104 CVEs