CVE Tracker
75,648 total CVEsLive vulnerability feed from the National Vulnerability Database
An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.
ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts.
Buffer overflow in SunOS/Solaris ps command.
php.cgi allows attackers to read any file on the system.
Certain programs in HP-UX 10.20 do not properly handle large user IDs (UID) or group IDs (GID) over 60000, which could allow local users to gain privileges.
Buffer overflow in nss_nisplus.so.1 library in NIS+ in Solaris 2.3 and 2.4 allows local users to gain root privileges.
The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories.
Oracle Webserver 2.1, when serving PL/SQL stored procedures, allows remote attackers to cause a denial of service via a long HTTP GET request.
Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file.
Buffer overflow in ping in AIX 4.2 and earlier allows local users to gain root privileges via a long command line argument.
Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands.
Buffer overflow in AIX lchangelv gives root access.
Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error.
root privileges via buffer overflow in xlock command on SGI IRIX systems.
root privileges via buffer overflow in ordist command on SGI IRIX systems.
root privileges via buffer overflow in login/scheme command on SGI IRIX systems.
root privileges via buffer overflow in eject command on SGI IRIX systems.
root privileges via buffer overflow in pset command on SGI IRIX systems.
root privileges via buffer overflow in df command on SGI IRIX systems.
The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file.
IRIX fam service allows an attacker to obtain a list of all files on the server.
Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session.
The Webgais program allows a remote user to execute arbitrary commands.
websendmail in Webgais 1.0 allows a remote user to access arbitrary files and execute arbitrary code via the receiver parameter ($VAR_receiver variable).
JavaScript in Internet Explorer 3.x and 4.x, and Netscape 2.x, 3.x and 4.x, allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability.
Showing 75301-75325 of 75,648 CVEs