text
stringlengths 0
383k
|
---|
description: ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. |
description: Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems. |
description: Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). |
description: MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook. |
description: Arbitrary command execution via IMAP buffer overflow in authenticate command. |
description: Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command. |
description: Information from SSL-encrypted sessions via PKCS #1. |
description: Buffer overflow in NIS+, in Sun's rpc.nisd program. |
description: Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. |
description: Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. |
description: Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer. |
description: Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. |
description: Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user. |
description: Unauthorized privileged access or denial of service via dtappgather program in CDE. |
description: Teardrop IP denial of service. |
description: Land IP denial of service. |
description: FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. |
description: Buffer overflow in statd allows root privileges. |
description: Delete or create a file via rpc.statd, due to invalid information. |
description: Arbitrary command execution via buffer overflow in Count.cgi (wwwcount) cgi-bin program. |
description: Local user gains root privileges via buffer overflow in rdist, via expstr() function. |
description: Local user gains root privileges via buffer overflow in rdist, via lookup() function. |
description: DNS cache poisoning via BIND, by predictable query IDs. |
description: root privileges via buffer overflow in df command on SGI IRIX systems. |
description: root privileges via buffer overflow in pset command on SGI IRIX systems. |
description: root privileges via buffer overflow in eject command on SGI IRIX systems. |
description: root privileges via buffer overflow in login/scheme command on SGI IRIX systems. |
description: root privileges via buffer overflow in ordist command on SGI IRIX systems. |
description: root privileges via buffer overflow in xlock command on SGI IRIX systems. |
description: JavaScript in Internet Explorer 3.x and 4.x, and Netscape 2.x, 3.x and 4.x, allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability. |
description: Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. |
description: Command execution in Sun systems via buffer overflow in the at program. |
description: Buffer overflow in suidperl (sperl), Perl 4.x and 5.x. |
description: Race condition in signal handling routine in ftpd, allowing read/write arbitrary files. |
description: IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. |
description: Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail. |
description: Buffer overflow in xlock program allows local users to execute commands as root. |
description: webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. |
description: Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. |
description: Buffer overflow in NLS (Natural Language Service). |
description: Buffer overflow in University of Washington's implementation of IMAP and POP servers. |
description: Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. |
description: fsdump command in IRIX allows local users to obtain root access by modifying sensitive files. |
description: List of arbitrary files on Web host via nph-test-cgi script. |
description: Buffer overflow of rlogin program using TERM environmental variable. |
description: MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4. |
description: Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges. |
description: Csetup under IRIX allows arbitrary file creation or overwriting. |
description: Buffer overflow in HP-UX newgrp program. |
description: Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. |
description: IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash. |
description: TCP RST denial of service in FreeBSD. |
description: Sun's ftpd daemon can be subjected to a denial of service. |
description: Buffer overflows in Sun libnsl allow root access. |
description: Buffer overflow in Sun's ping program can give root access to local users. |
description: Vacation program allows command execution by remote users through a sendmail command. |
description: Buffer overflow in PHP cgi program, php.cgi allows shell access. |
description: IRIX fam service allows an attacker to obtain a list of all files on the server. |
description: Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool. |
description: File creation and deletion, and remote execution, in the BSD line printer daemon (lpd). |
description: The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage. |
description: Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. |
description: Buffer overflow in AIX lquerylv program gives root access to local users. |
description: Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands. |
description: AnyForm CGI remote execution. |
description: phf CGI program allows remote command execution through shell metacharacters. |
description: CGI PHP mylog script allows an attacker to read any file on the target server. |
description: Solaris ufsrestore buffer overflow. |
description: test-cgi program allows an attacker to list files on the server. |
description: Apache httpd cookie buffer overflow for versions 1.1.1 and earlier. |
description: Buffer overflow in AIX xdat gives root access to local users. |
description: Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. |
description: Listening TCP ports are sequentially allocated, allowing spoofing attacks. |
description: PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password. |
description: Buffer overflow in wu-ftp from PASV command causes a core dump. |
description: Predictable TCP sequence numbers allow spoofing. |
description: pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. |
description: Remote attackers can cause a denial of service in FTP by issuing multiple PASV commands, causing the server to run out of available ports. |
description: Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command. |
description: wu-ftp allows files to be overwritten via the rnfr command. |
description: CWD ~root command in ftpd allows root access. |
description: getcwd() file descriptor leak in FTP. |
description: Certain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0. |
description: Buffer overflow in rwhod on AIX and other operating systems allows remote attackers to execute arbitrary code via a UDP packet with a long hostname. |
description: AIX routed allows remote users to modify sensitive files. |
description: Denial of service in AIX telnet can freeze a system and prevent users from accessing the server. |
description: IRIX and AIX automountd services (autofsd) allow remote users to execute root commands. |
description: Buffer overflow in AIX libDtSvc library can allow local users to gain root access. |
description: Buffer overflow in AIX rcp command allows local users to obtain root access. |
description: Buffer overflow in AIX writesrv command allows local users to obtain root access. |
description: Various vulnerabilities in the AIX portmir command allows local users to obtain root access. |
description: AIX nslookup command allows local users to obtain root access by not dropping privileges correctly. |
description: AIX piodmgrsu command allows local users to gain additional group privileges. |
description: The debug command in Sendmail is enabled, allowing attackers to execute commands as root. |
description: Sendmail decode alias can be used to overwrite sensitive files. |
description: The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character). |
description: Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activities. |
description: Buffer overflow in syslog utility allows local or remote attackers to gain root privileges. |
description: Remote access in AIX innd 1.5.1, using control messages. |