radar

ONE Sentinel

shield

CVE Tracker

74,473 total CVEs

Live vulnerability feed from the National Vulnerability Database

2.1

colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument.

7.2

dpsexec (DPS Server) when running under XDM in IBM AIX 3.2.5 and earlier does not properly check privileges, which allows local users to overwrite arbitrary files and gain privileges.

4.6

HP-UX 9.x does not properly enable the Xauthority mechanism in certain conditions, which could allow local users to access the X display even when they have not explicitly been authorized to do so.

7.5

Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.

7.5

AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled.

4.6

Vulnerability in hpterm on HP-UX 10.20 allows local users to gain additional privileges.

10.0

Some implementations of rlogin allow root access if given a -froot parameter.

7.2

Vulnerability in Vue 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4038, PHSS_4055, and PHSS_4066.

6.2

passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument.

7.2

Vulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users to access arbitrary files and gain privileges.

7.2

Vulnerability in VUE 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4994 and PHSS_5438.

7.2

Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root.

7.2

AIX Licensed Program Product performance tools allow local users to gain root access.

5.0

Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone.

4.6

Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges.

6.8

The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.

7.2

In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root access.

2.1

The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone.

7.2

Sendmail WIZ command enabled, allowing root access.

7.2

/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs.

10.0

SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable.

4.6

LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges.

10.0

Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon.

6.4

Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system.

7.5

Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the "no ip source-route" command.

Showing 74401-74425 of 74,473 CVEs