text
stringlengths
0
383k
description: A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files.
description: wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.
description: A bug in Cyrix CPUs on Linux allows local users to perform a denial of service.
description: Buffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution.
description: A buffer overflow in lsof allows local users to obtain root privilege.
description: Digital Unix Networker program nsralist has a buffer overflow which allows local users to obtain root privilege.
description: By default, IIS 4.0 has a virtual directory /IISADMPWD which contains files that can be used as proxies for brute force password attacks, or to identify valid users on the system.
description: Files created from interactive shell sessions in Cobalt RaQ microservers (e.g. .bash_history) are world readable, and thus are accessible from the web server.
description: Buffer overflow in gnuplot in Linux version 3.5 allows local users to obtain root access.
description: The cancel command in Solaris 2.6 (i386) has a buffer overflow that allows local users to obtain root access.
description: Several startup scripts in SCO OpenServer Enterprise System v 5.0.4p, including S84rpcinit, S95nis, S85tcp, and S89nfs, are vulnerable to a symlink attack, allowing a local user to gain root access.
description: In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension.
description: A buffer overflow in the SGI X server allows local users to gain root access through the X server font path.
description: In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection.
description: The HTTP server in Cisco 7xx series routers 3.2 through 4.2 is enabled by default, which allows remote attackers to change the router's configuration.
description: Vulnerability in Cisco 7xx series routers allows a remote attacker to cause a system reload via a TCP connection to the router's TELNET port.
description: 64 bit Solaris 7 procfs allows local users to perform a denial of service.
description: Denial of service in SMTP applications such as Sendmail, when a remote attacker (e.g. spammer) uses many "RCPT TO" commands in the same connection.
description: When the Microsoft SMTP service attempts to send a message to a server and receives a 4xx error code, it quickly and repeatedly attempts to redeliver the message, causing a denial of service.
description: umapfs allows local users to gain root privileges by changing their uid through a malicious mount_umap program.
description: During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password.
description: In some cases, NetBSD 1.3.3 mount allows local users to execute programs in some file systems that have the "noexec" flag set.
description: Vulnerability in hpterm on HP-UX 10.20 allows local users to gain additional privileges.
description: talkback in Netscape 4.5 allows a local user to overwrite arbitrary files of another user whose Netscape crashes.
description: talkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes.
description: The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.
description: Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
description: OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
description: The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference.
description: Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.
description: Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
description: ftp on HP-UX 11.00 allows local users to gain privileges.
description: XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
description: XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
description: MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.
description: Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.
description: Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.
description: Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.
description: Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
description: The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.
description: Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.
description: Solaris ff.core allows local users to modify files.
description: Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.
description: Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.
description: In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.
description: Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
description: Local users can gain privileges using the debug utility in the MPE/iX operating system.
description: IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
description: The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
description: In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
description: Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
description: A service or application has a backdoor password that was placed there by the developer.
description: An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
description: A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.
description: The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.
description: Linux ftpwatch program allows local users to gain root privileges.
description: L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
description: Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.
description: Buffer overflow in Linux autofs module through long directory names allows local users to perform a denial of service.
description: Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.
description: suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk.
description: Remote attackers can perform a denial of service using IRIX fcagent.
description: Local users can perform a denial of service in Tripwire 1.2 and earlier using long filenames.
description: Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.
description: The SVR4 /dev/wabi special device file in NetBSD 1.3.3 and earlier allows a local user to read or write arbitrary files on the disk associated with that device.
description: The Webcom CGI Guestbook programs wguest.exe and rguest.exe allow a remote attacker to read arbitrary files using the "template" parameter.
description: Internet Explorer 5.0 allows a remote server to read arbitrary files on the client's file system using the Microsoft Scriptlet Component.
description: Internet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client.
description: A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted.
description: The remote proxy server in Winroute allows a remote attacker to reconfigure the proxy without authentication through the "cancel" button.
description: The SNMP default community name "public" is not properly removed in NetApps C630 Netcache, even if the administrator tries to disable it.
description: The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred.
description: The ICQ Webserver allows remote attackers to use .. to access arbitrary files outside of the user's personal directory.
description: A race condition in how procmail handles .procmailrc files allows a local user to read arbitrary files available to the user who is running procmail.
description: A weak encryption algorithm is used for passwords in SCO TermVision, allowing them to be easily decrypted by a local user.
description: The Expression Evaluator in the ColdFusion Application Server allows a remote attacker to upload files to the server via openfile.cfm, which does not restrict access to the server properly.
description: Denial of service in HP-UX sendmail 8.8.6 related to accepting connections.
description: Denial of service Netscape Enterprise Server with VirtualVault on HP-UX VVOS systems.
description: Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack.
description: Denial of service in "poll" in OpenBSD.
description: OpenBSD kernel crash through TSS handling, as caused by the crashme program.
description: OpenBSD crash using nlink value in FFS and EXT2FS filesystems.
description: Buffer overflow in OpenBSD ping.
description: Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD.
description: Denial of service in AOL Instant Messenger when a remote attacker sends a malicious hyperlink to the receiving client, potentially causing a system crash.
description: The DHTML Edit ActiveX control in Internet Explorer allows remote attackers to read arbitrary files.
description: Internet Explorer 4.0 and 5.0 allows a remote attacker to execute security scripts in a different security context using malicious URLs, a variant of the "cross frame" vulnerability.
description: MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to paste a file name into the file upload intrinsic control, a variant of "untrusted scripted paste" as described in MS:MS98-013.
description: MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to learn information about a local user's files via an IMG SRC tag.
description: The prompt parsing in bash allows a local user to execute commands as another user by creating a directory with the name of the command to execute.
description: The ffingerd 1.19 allows remote attackers to identify users on the target system based on its responses.
description: rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd.
description: Denial of service in WinGate proxy through a buffer overflow in POP3.
description: A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.
description: A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin.
description: Anonymous FTP is enabled.
description: TFTP is not running in a restricted directory, allowing a remote attacker to access sensitive information such as password files.
description: NETBIOS share information may be published through SNMP registry keys in NT.
description: A Unix account has a guessable password.
description: A Unix account has a default, null, blank, or missing password.