CVE Tracker
96,722 total CVEsLive vulnerability feed from the National Vulnerability Database
The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
Outlook Express 5.01 and Internet Explorer 5.01 allow remote attackers to view a user's email messages via a script that accesses a variable that references subsequent email messages that are read by the client.
The Shoptron shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The SmartCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The SalesCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The Make-a-Store OrderPage shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function.
The mcsp Client Site Processor system (MultiCSP) in Standard and Poor's ComStock is installed with several accounts that have no passwords or easily guessable default passwords.
The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root).
Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag.
The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions.
Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine.
Buffer overflow in SCO scohelp program allows remote attackers to execute commands.
The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics.
Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack.
Microsoft Index Server allows remote attackers to determine the real path for a web directory via a request to an Internet Data Query file that does not exist.
The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the "Malformed Hit-Highlighting Argument" vulnerability.
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier.
IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page.
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
Buffer overflow in vchkpw/vpopmail POP authentication package allows remote attackers to gain root privileges via a long username or password.
Buffer overflow in the conversion utilities for Japanese, Korean and Chinese Word 5 documents allows an attacker to execute commands, aka the "Malformed Conversion Data" vulnerability.
A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded.
The BSD make program allows local users to modify files via a symlink attack when the -j option is being used.
Showing 95076-95100 of 96,722 CVEs