radar

ONE Sentinel

shield

CVE Tracker

96,689 total CVEs

Live vulnerability feed from the National Vulnerability Database

4.6

The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.

7.5

htdig allows remote attackers to execute commands via filenames with shell metacharacters.

10.0

Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service.

7.5

Buffer overflow in Xshipwars xsw program.

5.0

The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.

5.1

Internet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect."

2.1

Sendmail allows local users to reinitialize the aliases database via the newaliases command, then cause a denial of service by interrupting Sendmail.

10.0

Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode.

5.0

Buffer overflow in GoodTech Telnet Server NT allows remote users to cause a denial of service via a long login name.

7.5

Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol.

2.1

Error messages generated by gdm with the VerboseAuth setting allows an attacker to identify valid users on a system.

7.2

The Sun Web-Based Enterprise Management (WBEM) installation script stores a password in plaintext in a world readable file.

7.2

UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack.

5.0

ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program.

7.5

ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.

2.1

Internet Anywhere POP3 Mail Server allows local users to cause a denial of service via a malformed RETR command.

7.2

Buffer overflow in UnixWare xauto program allows local users to gain root privilege.

5.0

Buffer overflow in CommuniGatePro via a long string to the HTTP configuration port.

7.2

UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file.

3.6

The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail.

2.1

dump in Debian GNU/Linux 2.1 does not properly restore symlinks, which allows a local user to modify the ownership of arbitrary files.

2.1

Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privileges by reading a plaintext password file.

5.0

Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server.

7.2

IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin.

3.6

The default permissions for Endymion MailMan allow local users to read email or modify files.

Showing 95276-95300 of 96,689 CVEs