CVE Tracker
74,835 total CVEsLive vulnerability feed from the National Vulnerability Database
Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access.
admintool in Solaris allows a local user to write to arbitrary files and gain root access.
Local user gains root privileges via buffer overflow in rdist, via lookup() function.
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
A design flaw in the Z-Modem protocol allows the remote sender of a file to execute arbitrary programs on the client, as implemented in rz in the rzsz module of FreeBSD before 2.1.5, and possibly other programs.
The dip program on many Linux systems allows local users to gain root access via a buffer overflow.
Local user gains root privileges via buffer overflow in rdist, via expstr() function.
The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server.
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
Vulnerability in a kernel error handling routine in SCO OpenServer 5.0.2 and earlier, and SCO Internet FastStart 1.0, allows local users to gain root privileges.
nettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information.
Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.
The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate.
Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands.
Vulnerability in union file system in FreeBSD 2.2 and earlier, and possibly other operating systems, allows local users to cause a denial of service (system reload) via a series of certain mount_union commands.
Delete or create a file via rpc.statd, due to invalid information.
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
dxconsole in DEC OSF/1 3.2C and earlier allows local users to read arbitrary files by specifying the file with the -file parameter.
test-cgi program allows an attacker to list files on the server.
Java Bytecode Verifier allows malicious applets to execute arbitrary commands as the user of the applet.
phf CGI program allows remote command execution through shell metacharacters.
The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts.
IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files.
Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys.
Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm.
Showing 74701-74725 of 74,835 CVEs