CVE Tracker
96,690 total CVEsLive vulnerability feed from the National Vulnerability Database
Buffer overflow in Lotus Domino HTTP server allows remote attackers to cause a denial of service via a long URL.
Lotus Domino HTTP server does not properly disable anonymous access for the cgi-bin directory.
Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter.
Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.
DNS PRO allows remote attackers to conduct a denial of service via a large number of connections.
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
Groupwise web server GWWEB.EXE allows remote attackers to determine the real path of the web server via the HELP parameter.
Groupwise web server GWWEB.EXE allows remote attackers to read arbitrary files with .htm extensions via a .. (dot dot) attack using the HELP parameter.
Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command.
Cisco Cache Engine allows a remote attacker to gain access via a null username and password.
The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics.
Cisco Cache Engine allows an attacker to replace content in the cache.
Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords.
Buffer overflow in Infoseek Ultraseek search engine allows remote attackers to execute commands via a long GET request.
classifieds.cgi allows remote attackers to execute arbitrary commands by specifying them in a hidden variable in a CGI form.
classifieds.cgi allows remote attackers to read arbitrary files via shell metacharacters.
The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information.
daynad program in Intel InBusiness E-mail Station does not require authentication, which allows remote attackers to modify its configuration, delete files, or read mail.
An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.
Buffer overflow in VDO Live Player allows remote attackers to execute commands on the VDO client via a malformed .vdo file.
War FTP Daemon 1.70 allows remote attackers to cause a denial of service by flooding it with connections.
Modifications to ACLs (Access Control Lists) in Microsoft Exchange 5.5 do not take effect until the directory store cache is refreshed.
The Disney Go Express Search allows remote attackers to access and modify search information for users by connecting to an HTTP server on the user's system.
The Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL.
Showing 95251-95275 of 96,690 CVEs