radar

ONE Sentinel

shield

CVE Tracker

96,382 total CVEs

Live vulnerability feed from the National Vulnerability Database

10.0

IIS has the #exec function enabled for Server Side Include (SSI) files.

10.0

A system-critical Windows NT file or directory has inappropriate permissions.

10.0

A system-critical Unix file or directory has inappropriate permissions.

10.0

Two or more Unix accounts have the same UID.

10.0

A Unix account with a name other than "root" has UID 0, i.e. root privileges.

10.0

NFS exports system-critical data to the world, e.g. / or a password file.

7.2

Windows NT automatically logs in an administrator upon rebooting.

10.0

A superfluous NFS server is running, but it is not importing or exporting any file systems.

10.0

An SSH server allows authentication through the .rhosts file.

10.0

A trust relationship exists between two Unix hosts.

10.0

A system is operating in "promiscuous" mode which allows it to perform packet sniffing.

7.5

A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc.

7.5

A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.

10.0

The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.

0.0

ICMP echo (ping) is allowed from arbitrary hosts.

6.4

A system-critical NETBIOS/SMB share has inappropriate access control.

10.0

An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv.

10.0

A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.

0.0

Anonymous FTP is enabled.

10.0

A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.

10.0

Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.

10.0

A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.

5.0

An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).

10.0

A service or application has a backdoor password that was placed there by the developer.

5.0

IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.

Showing 95651-95675 of 96,382 CVEs