text
stringlengths 0
383k
|
---|
description: Lotus Domino HTTP server does not properly disable anonymous access for the cgi-bin directory. |
description: Buffer overflow in Lotus Domino HTTP server allows remote attackers to cause a denial of service via a long URL. |
description: IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the "Escape Character Parsing" vulnerability. |
description: IIS 4.0 and Site Server 3.0 allow remote attackers to read source code for ASP files if the file is in a virtual directory whose name includes extensions such as .com, .exe, .sh, .cgi, or .dll, aka the "Virtual Directory Naming" vulnerability. |
description: Buffer overflow in UnixWare i2odialogd daemon allows remote attackers to gain root access via a long username/password authorization string. |
description: IBM Network Station Manager NetStation allows local users to gain privileges via a symlink attack. |
description: Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function. |
description: UnixWare pis and mkpis commands allow local users to gain privileges via a symlink attack. |
description: Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /var/dmi/db database. |
description: The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack. |
description: Solaris dmi_cmd allows local users to crash the dmispd daemon by adding a malformed file to the /var/dmi/db database. |
description: InterScan VirusWall SMTP scanner does not properly scan messages with malformed attachments. |
description: Netscape 4.7 records user passwords in the preferences.js file during an IMAP or POP session, even if the user has not enabled "remember passwords." |
description: resend command in Majordomo allows local users to gain privileges via shell metacharacters. |
description: Outlook Express 5 for Macintosh downloads attachments to HTML mail without prompting the user, aka the "HTML Mail Attachment" vulnerability. |
description: Majordomo wrapper allows local users to gain privileges by specifying an alternate configuration file. |
description: glFtpD includes a default glftpd user account with a default password and a UID of 0. |
description: AltaVista search engine allows remote attackers to read files above the document root via a .. (dot dot) in the query.cgi CGI program. |
description: glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command. |
description: Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack. |
description: Buffer overflow in CSM mail server allows remote attackers to cause a denial of service or execute commands via a long HELO command. |
description: Buffer overflow in CamShot WebCam HTTP server allows remote attackers to execute commands via a long GET request. |
description: Macros in War FTP 1.70 and 1.67b2 allow local or remote attackers to read arbitrary files or execute commands. |
description: MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege. |
description: Buffer overflow in ICQ 99b 1.1.1.1 client allows remote attackers to execute commands via a malformed URL within an ICQ message. |
description: Buffer overflow in Yahoo Pager/Messenger client allows remote attackers to cause a denial of service via a long URL within a message. |
description: get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program. |
description: Buffer overflow in Winamp client allows remote attackers to execute commands via a long entry in a .pls file. |
description: The Allaire Spectra Webtop allows authenticated users to access other Webtop sections by specifying explicit URLs. |
description: The Allaire Spectra Configuration Wizard allows remote attackers to cause a denial of service by repeatedly resubmitting data collections for indexing via a URL. |
description: Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack. |
description: Microsoft Commercial Internet System (MCIS) IMAP server allows remote attackers to cause a denial of service via a malformed IMAP request. |
description: search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack. |
description: Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. |
description: IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi. |
description: Cold Fusion CFCACHE tag places temporary cache files within the web document root, allowing remote attackers to obtain sensitive system information. |
description: Network HotSync program in Handspring Visor does not have authentication, which allows remote attackers to retrieve email and files. |
description: PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands. |
description: Buffer overflow in aVirt Rover POP3 server 1.1 allows remote attackers to cause a denial of service via a long user name. |
description: Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading. |
description: The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities. |
description: cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to read arbitrary files by specifying the filename in a parameter to the script. |
description: cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to cause a denial of service via a malformed URL that includes shell metacharacters. |
description: Buffer overflow in InetServ 3.0 allows remote attackers to execute commands via a long GET request. |
description: WebSite Pro allows remote attackers to determine the real pathname of webdirectories via a malformed URL request. |
description: CyberCash Merchant Connection Kit (MCK) allows local users to modify files via a symlink attack. |
description: daynad program in Intel InBusiness E-mail Station does not require authentication, which allows remote attackers to modify its configuration, delete files, or read mail. |
description: The recover program in Solstice Backup allows local users to restore sensitive files. |
description: NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request." |
description: IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions. |
description: Visual Casel (Vcasel) does not properly prevent users from executing files, which allows local users to use a relative pathname to specify an alternate file which has an approved name and possibly gain privileges. |
description: Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word. |
description: PowerScripts PlusMail CGI program allows remote attackers to execute commands via a password file with improper permissions. |
description: Super Mail Transfer Package (SMTP), later called MsgCore, has a memory leak which allows remote attackers to cause a denial of service by repeating multiple HELO, MAIL FROM, RCPT TO, and DATA commands in the same session. |
description: nviboot boot script in the Debian nvi package allows local users to delete files via malformed entries in vi.recover. |
description: The October 1998 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the ps and grep commands. |
description: The June 1999 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the awk command. |
description: The W3C CERN httpd HTTP server allows remote attackers to determine the real pathnames of some commands via a request for a nonexistent URL. |
description: AIX techlibss allows local users to overwrite files via a symlink attack. |
description: Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute the code by using hexadecimal codes to specify the javascript: protocol, e.g. jAvascript. |
description: WebTV email client allows remote attackers to force the client to send email without the user's knowledge via HTML. |
description: HP asecure creates the Audio Security File audio.sec with insecure permissions, which allows local users to cause a denial of service or gain additional privileges. |
description: CuteFTP uses weak encryption to store password information in its tree.dat file. |
description: Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute code via the LOWSRC or DYNRC parameters in the IMG tag. |
description: Netopia Timbuktu Pro sends user IDs and passwords in cleartext, which allows remote attackers to obtain them via sniffing. |
description: Netscape Mail Notification (nsnotify) utility in Netscape Communicator uses IMAP without SSL, even if the user has set a preference for Communicator to use an SSL connection, allowing a remote attacker to sniff usernames and passwords in plaintext. |
description: Buffer overflow in the conversion utilities for Japanese, Korean and Chinese Word 5 documents allows an attacker to execute commands, aka the "Malformed Conversion Data" vulnerability. |
description: The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the "RDISK Registry Enumeration File" vulnerability. |
description: VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack. |
description: Buffer overflow in vchkpw/vpopmail POP authentication package allows remote attackers to gain root privileges via a long username or password. |
description: The BSD make program allows local users to modify files via a symlink attack when the -j option is being used. |
description: An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5. |
description: procfs in BSD systems allows local users to gain root privileges by modifying the /proc/pid/mem interface via a modified file descriptor for stderr. |
description: The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier. |
description: Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command. |
description: The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the "Malformed Hit-Highlighting Argument" vulnerability. |
description: Microsoft Index Server allows remote attackers to determine the real path for a web directory via a request to an Internet Data Query file that does not exist. |
description: Buffer overflow in UnixWare ppptalk command allows local users to gain privileges via a long prompt argument. |
description: The SMS Remote Control program is installed with insecure permissions, which allows local users to gain privileges by modifying or replacing the program. |
description: The Make-a-Store OrderPage shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
description: The SalesCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
description: The SmartCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
description: The Shoptron shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
description: Outlook Express 5.01 and Internet Explorer 5.01 allow remote attackers to view a user's email messages via a script that accesses a variable that references subsequent email messages that are read by the client. |
description: The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
description: Linux apcd program allows local attackers to modify arbitrary files via a symlink attack. |
description: The Intellivend shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
description: The mcsp Client Site Processor system (MultiCSP) in Standard and Poor's ComStock is installed with several accounts that have no passwords or easily guessable default passwords. |
description: The WebSiteTool shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. |
description: The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions. |
description: The default installation of Debian GNU/Linux uses an insecure Master Boot Record (MBR) which allows a local user to boot from a floppy disk during the installation. |
description: The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics. |
description: Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory. |
description: IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page. |
description: Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. |
description: The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root). |
description: The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. |
description: The default configurations for McAfee Virus Scan and Norton Anti-Virus virus checkers do not check files in the RECYCLED folder that is used by the Windows Recycle Bin utility, which allows attackers to store malicious code without detection. |
description: The Remote Access Service invoke.cfm template in Allaire Spectra 1.0 allows users to bypass authentication via the bAuthenticated parameter. |
description: The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the "Recycle Bin Creation" vulnerability. |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.