radar

ONE Sentinel

shield

CVE Tracker

96,741 total CVEs

Live vulnerability feed from the National Vulnerability Database

7.2

The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.

5.0

Infonautics getdoc.cgi allows remote attackers to bypass the payment phase for accessing documents via a modified form variable.

10.0

The BizDB CGI script bizdb-search.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the dbname parameter.

6.4

The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon.

5.0

TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webplus CGI program.

5.0

The AVM KEN! ISDN Proxy server allows remote attackers to cause a denial of service via a malformed request.

5.0

The AVM KEN! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

7.2

The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users.

5.0

IIS 4.0 and 5.0 allows remote attackers to cause a denial of service by sending many URLs with a large number of escaped characters, aka the "Myriad Escaped Characters" Vulnerability.

10.0

The dansie shopping cart application cart.pl allows remote attackers to modify sensitive purchase information via hidden form fields.

5.0

The dansie shopping cart application cart.pl allows remote attackers to execute commands via a shell metacharacters in a form variable.

7.2

The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.

7.2

After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.

7.5

The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.

5.0

The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.

7.2

Buffer overflow in healthd for FreeBSD allows local users to gain root privileges.

2.1

BeOS 4.5 and 5.0 allow local users to cause a denial of service via malformed direct system calls using interrupt 37.

2.1

CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN.

2.1

The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name.

5.0

PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt.

7.2

The unattended installation of Windows 2000 with the OEMPreinstall option sets insecure permissions for the All Users and Default Users directories.

5.0

BeOS allows remote attackers to cause a denial of service via malformed packets whose length field is less than the length of the headers.

5.0

Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command.

10.0

The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.

5.0

HP-UX 11.04 VirtualVault (VVOS) sends data to unprivileged processes via an interface that has multiple aliased IP addresses.

Showing 94926-94950 of 96,741 CVEs