CVE Tracker
96,401 total CVEsLive vulnerability feed from the National Vulnerability Database
The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user.
Local users can perform a denial of service in Tripwire 1.2 and earlier using long filenames.
Buffer overflow in Dosemu Slang library in Linux.
search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack.
Buffer overflow in the FTP client in the Debian GNU/Linux netstd package.
Buffer overflow in the bootp server in the Debian Linux netstd package.
HP-UX aserver program allows local users to gain privileges via a symlink attack.
The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users.
IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the "flags" registry key to 1920.
wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.
Off-by-one error in NcFTPd FTP server before 2.4.1 allows a remote attacker to cause a denial of service (crash) via a long PORT command.
Win32 ICQ 98a 1.30, and possibly other versions, does not display the entire portion of long filenames, which could allow attackers to send an executable file with a long name that contains so many spaces that the .exe extension is not displayed, which could make the user believe that the file is safe to open from the client.
PIM software for Royal daVinci does not properly password-protext access to data stored in the .mdb (Microsoft Access) file, which allows local users to read the data without a password by directly accessing the files with a different application, such as Access.
Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux.
An application-critical Windows NT registry key has an inappropriate value.
An application-critical Windows NT registry key has inappropriate permissions.
A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
WinGate is being used.
The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
The OS/2 or POSIX subsystem in NT is enabled.
A component service related to NIS+ is running.
The rsh/rlogin service is running.
The netstat service is running, which provides sensitive information to remote attackers.
Showing 95601-95625 of 96,401 CVEs