radar

ONE Sentinel

shield

CVE Tracker

159,764 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.5

The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack.

7.5

Buffer overflow in PHP cgi program, php.cgi allows shell access.

7.5

Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources.

10.0

Buffer overflow in University of Washington's implementation of IMAP and POP servers.

5.0

Windows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25.

7.2

Buffer overflow in Solaris fdformat command gives root access to local users.

5.0

Denial of service through Winpopup using large user names.

7.5

Remote command execution in Microsoft Internet Explorer using .lnk and .url files.

5.1

Macromedia Shockwave before 6.0 allows a malicious webmaster to read a user's mail box and possibly access internal web servers via the GetNextText command on a Shockwave movie.

2.1

Vulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost.

9.3

Buffer overflow in FreeBSD lpd through long DNS hostnames.

7.2

Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument.

5.1

Internet Explorer 3.01 on Windows 95 allows remote malicious web sites to execute arbitrary commands via a .isp file, which is automatically downloaded and executed without prompting the user.

0.0

A version of finger is running that exposes valid user information to any entity on the network.

7.2

Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable.

10.0

NFS cache poisoning.

2.1

Finger redirection allows finger bombs.

2.1

finger allows recursive searches by using a long string of @ symbols.

7.2

ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.

7.5

Buffer overflow in NLS (Natural Language Service).

7.2

Buffer overflow in ffbconfig in Solaris 2.5.1.

5.0

Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT.

10.0

Buffer overflow of rlogin program using TERM environmental variable.

7.5

ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack.

10.0

rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.

Showing 159501-159525 of 159,764 CVEs