text
stringlengths 0
383k
|
---|
description: A quote cwd command on FTP servers can reveal the full path of the home directory of the "ftp" user. |
description: The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands. |
description: In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program. |
description: Sendmail 8.6.9 allows remote attackers to execute root commands, using ident. |
description: Denial of service in Sendmail 8.6.11 and 8.6.12. |
description: MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access. |
description: Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command. |
description: rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. |
description: The SunView (SunTools) selection_svc facility allows remote users to read files. |
description: Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters. |
description: Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone. |
description: Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server. |
description: libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind. |
description: Denial of service by sending forged ICMP unreachable packets. |
description: Routed allows attackers to append data to files. |
description: Denial of service of inetd on Linux through SYN and RST packets. |
description: Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems. |
description: Livingston portmaster machines could be rebooted via a series of commands. |
description: Buffer overflow in FTP Serv-U 2.5 allows remote authenticated users to cause a denial of service (crash) via a long (1) CWD or (2) LS (list) command. |
description: Attackers can do a denial of service of IRC by crashing the server. |
description: Denial of service of Ascend routers through port 150 (remote administration). |
description: Denial of service in Cisco IOS web server allows attackers to reboot the router using a long URL. |
description: Solaris syslogd crashes when receiving a message from a host that doesn't have an inverse DNS entry. |
description: Denial of service in Windows NT messenger service through a long username. |
description: Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size. |
description: Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service. |
description: Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service. |
description: Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT. |
description: Denial of service in Windows NT IIS server using ..\.. |
description: Buffer overflow in Cisco 7xx routers through the telnet service. |
description: Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access. |
description: Buffer overflow in NCSA WebServer (version 1.5c) gives remote access. |
description: IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files. |
description: Bash treats any character with a value of 255 as a command separator. |
description: Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access. |
description: ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs. |
description: Remote execution of arbitrary commands through Guestbook CGI program. |
description: php.cgi allows attackers to read any file on the system. |
description: Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET. |
description: Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy. |
description: Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. |
description: Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords. |
description: Linux cfingerd could be exploited to gain root access. |
description: Livingston RADIUS code has a buffer overflow which can allow remote execution of commands as root. |
description: Some configurations of NIS+ in Linux allowed attackers to log in as the user "+". |
description: HP Remote Watch allows a remote user to gain root access. |
description: Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands. |
description: A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials. |
description: Windows NT RSHSVC program allows remote users to execute arbitrary commands. |
description: Denial of service in Qmail through long SMTP commands. |
description: Denial of service in talk program allows remote attackers to disrupt a user's display. |
description: Buffer overflow in listserv allows arbitrary command execution. |
description: IIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL. |
description: A hidden SNMP community string in HP OpenView allows remote attackers to modify MIB tables and obtain sensitive information. |
description: Buffer overflow in ircd allows arbitrary command execution. |
description: Buffer overflow in War FTP allows remote execution of commands. |
description: Nestea variation of teardrop IP fragmentation denial of service. |
description: Bonk variation of teardrop IP fragmentation denial of service. |
description: cfingerd lists all users on a system via search.**@target. |
description: The jj CGI program allows command execution via shell metacharacters. |
description: Netmanager Chameleon SMTPd has several buffer overflows that cause a crash. |
description: Hylafax faxsurvey CGI script on Linux allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. |
description: Solaris SUNWadmap can be exploited to obtain root access. |
description: htmlscript CGI program allows remote read access to files. |
description: ICMP redirect messages may crash or lock up a host. |
description: The info2www CGI script allows remote file access or remote command execution. |
description: Buffer overflow in NCSA HTTP daemon v1.3 allows remote command execution. |
description: MetaInfo MetaWeb web server allows users to upload, execute, and read scripts. |
description: Netscape Enterprise servers may list files through the PageServices query. |
description: Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. |
description: Progressive Networks Real Video server (pnserver) can be crashed remotely. |
description: Denial of service in Slmail v2.5 through the POP3 port. |
description: Denial of service through Solaris 2.5.1 telnet by sending ^D characters. |
description: Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made. |
description: Denial of service in Windows NT DNS servers by flooding port 53 with too many characters. |
description: mSQL v2.0.1 and below allows remote execution through a buffer overflow. |
description: The WorkMan program can be used to overwrite any file to get root access. |
description: In IIS, remote attackers can obtain source code for ASP files by appending "::$DATA" to the URL. |
description: Excite for Web Servers (EWS) allows remote command execution via shell metacharacters. |
description: Remote command execution in Microsoft Internet Explorer using .lnk and .url files. |
description: Denial of service in IIS using long URLs. |
description: The Java Web Server would allow remote users to obtain the source code for CGI programs. |
description: Denial of service to NT mail servers including Ipswitch, Mdaemon, and Exchange through a buffer overflow in the SMTP HELO command. |
description: Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection. |
description: In some NT web servers, appending a space at the end of a URL may allow attackers to read source code for active pages. |
description: Vulnerability in the Wguest CGI program. |
description: The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets. |
description: The Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL. |
description: The WinGate telnet proxy allows remote attackers to cause a denial of service via a large number of connections to localhost. |
description: The WinGate proxy is installed without a password, which allows remote attackers to redirect connections without authentication. |
description: Denial of service through Winpopup using large user names. |
description: AAA authentication on Cisco systems allows attackers to execute commands without authorization. |
description: All records in a WINS database can be deleted through SNMP for a denial of service. |
description: Solaris sysdef command allows local users to read kernel memory, potentially leading to root privileges. |
description: Solaris volrmmount program allows attackers to read any file. |
description: Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable. |
description: ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack. |
description: Buffer overflow in FreeBSD lpd through long DNS hostnames. |
description: nis_cachemgr for Solaris NIS+ allows attackers to add malicious NIS+ servers. |