CVE Tracker
74,889 total CVEsLive vulnerability feed from the National Vulnerability Database
IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have "No Access" permissions.
FreeBSD VFS cache (vfs_cache) allows local users to cause a denial of service by opening a large number of files.
The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack.
Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field.
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
The SSH authentication agent follows symlinks via a UNIX domain socket.
WWWBoard has a default username and default password.
WWWBoard stores encrypted passwords in a password file that is under the web root and thus accessible by remote attackers.
sccw allows local users to read arbitrary files.
iHTML Merchant allows remote attackers to obtain sensitive information or execute commands via a code parsing error.
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. telnet.
guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument.
Buffer overflow in FuseMAIL POP service via long USER and PASS commands.
Buffer overflow in Accept command in Netscape Enterprise Server 3.6 with the SSL Handshake Patch.
Hotmail allows Javascript to be executed via the HTML STYLE tag, allowing remote attackers to execute commands on the user's Hotmail account.
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
Computalynx CMail 2.4 and CMail 2.3 SP2 SMTP servers are vulnerable to a buffer overflow attack in the MAIL FROM command that may allow a remote attacker to execute arbitrary code on the server.
The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll) ActiveX controls for Internet Explorer (IE) 4.01 and 5.0 are marked as "Safe for Scripting," which allows remote attackers to create and modify files and execute arbitrary commands.
Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user.
Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Showing 73676-73700 of 74,889 CVEs