CVE Tracker
98,499 total CVEsLive vulnerability feed from the National Vulnerability Database
Buffer overflow in mutt mail client allows remote attackers to execute commands via malformed MIME messages.
Arkiea nlservd allows remote attackers to conduct a denial of service.
Buffer overflow in Registration Wizard ActiveX control (regwizc.dll, InvokeRegWizard) 3.0.0.0 for Internet Explorer 4.01 and 5 allows remote attackers to execute arbitrary commands.
Buffer overflow in MSN Setup BBS 4.71.0.10 ActiveX control (setupbbs.ocx) allows a remote attacker to execute arbitrary commands via the methods (1) vAddNewsServer or (2) bIsNewsServerConfigured.
Directory traversal vulnerability in KVIrc IRC client 0.9.0 with the "Listen to !nick <soundname> requests" option enabled allows remote attackers to read arbitrary files via a .. (dot dot) in a DCC GET request.
Buffer overflow in (1) nlservd and (2) rnavc in Knox Software Arkeia backup product allows local users to obtain root access via a long HOME environmental variable.
Buffer overflow in GNOME libraries 1.0.8 allows local user to gain root access via a long --espeaker argument in programs such as nethack.
named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file.
Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter.
Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable.
IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have "No Access" permissions.
FreeBSD VFS cache (vfs_cache) allows local users to cause a denial of service by opening a large number of files.
The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack.
Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field.
Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability.
The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager.
The SSH authentication agent follows symlinks via a UNIX domain socket.
WWWBoard has a default username and default password.
WWWBoard stores encrypted passwords in a password file that is under the web root and thus accessible by remote attackers.
sccw allows local users to read arbitrary files.
iHTML Merchant allows remote attackers to obtain sensitive information or execute commands via a code parsing error.
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. telnet.
guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->".
Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument.
Showing 97276-97300 of 98,499 CVEs