radar

ONE Sentinel

shield

CVE Tracker

96,687 total CVEs

Live vulnerability feed from the National Vulnerability Database

5.0

Netscape Messaging Server 3.54, 3.55, and 3.6 allows a remote attacker to cause a denial of service (memory exhaustion) via a series of long RCPT TO commands.

2.6

Netscape Communicator 4.7 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long certificate key.

10.0

Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.

5.0

URL Live! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

5.0

Falcon web server allows remote attackers to determine the absolute path of the web root via long file names.

5.0

LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.

4.6

Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session.

7.5

genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.

5.0

Falcon web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

5.0

The Zeus web server administrative interface uses weak encryption for its passwords.

10.0

Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.

10.0

IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.

7.2

ypserv allows local administrators to modify password tables.

7.2

ypserv allows a local user to modify the GECOS and login shells of other users.

7.2

Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation.

6.2

Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory.

7.2

Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges.

4.6

Linux kernel before 2.3.18 or 2.2.13pre15, with SLIP and PPP options, allows local unprivileged users to forge IP packets via the TIOCSETD option on tty devices.

10.0

Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.

7.6

Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.

5.0

Denial of service in Axent Raptor firewall via malformed zero-length IP options.

9.3

The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.

7.5

Firewall-1 does not properly restrict access to LDAP attributes.

7.5

When BSDI patches for Gauntlet 5.0 BSDI are installed in a particular order, Gauntlet allows remote attackers to bypass firewall access restrictions, and does not log the activities.

5.0

ICQ ActiveList Server allows remote attackers to cause a denial of service (crash) via malformed packets to the server's UDP port.

Showing 95401-95425 of 96,687 CVEs