radar

ONE Sentinel

shield

CVE Tracker

75,648 total CVEs

Live vulnerability feed from the National Vulnerability Database

5.0

Denial of service when an attacker sends many SYN packets to create multiple connections without ever sending an ACK to complete the connection, aka SYN flood.

4.6

Transarc DCE Distributed File System (DFS) 1.1 for Solaris 2.4 and 2.5 does not properly initialize the grouplist for users who belong to a large number of groups, which could allow those users to gain access to resources that are protected by DFS.

4.6

(1) bash before 1.14.7, and (2) tcsh 6.05 allow local users to gain privileges via directory names that contain shell metacharacters (` back-tick), which can cause the commands enclosed in the directory name to be executed when the shell expands filenames using the \w option in the PS1 variable.

7.2

Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.

7.2

Vulnerability in a certain system call in SCO UnixWare 2.0.x and 2.1.0 allows local users to access arbitrary files and gain root privileges.

7.2

ppl program in HP-UX allows local users to create root files through symlinks.

7.2

Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option.

4.6

Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail.

7.5

Buffer overflow in rwhod on AIX and other operating systems allows remote attackers to execute arbitrary code via a UDP packet with a long hostname.

2.1

Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access.

2.1

fm_fls license server for Adobe Framemaker allows local users to overwrite arbitrary files and gain root access.

7.2

vold in Solaris 2.x allows local users to gain root access.

4.6

Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg.

7.2

Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access.

7.2

admintool in Solaris allows a local user to write to arbitrary files and gain root access.

7.2

Local user gains root privileges via buffer overflow in rdist, via lookup() function.

2.1

cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.

7.5

A design flaw in the Z-Modem protocol allows the remote sender of a file to execute arbitrary programs on the client, as implemented in rz in the rzsz module of FreeBSD before 2.1.5, and possibly other programs.

7.2

The dip program on many Linux systems allows local users to gain root access via a buffer overflow.

7.8

Local user gains root privileges via buffer overflow in rdist, via expstr() function.

5.0

The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server.

7.2

The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.

7.2

Vulnerability in a kernel error handling routine in SCO OpenServer 5.0.2 and earlier, and SCO Internet FastStart 1.0, allows local users to gain root privileges.

2.1

nettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information.

10.0

Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.

Showing 75501-75525 of 75,648 CVEs