text
stringlengths
0
383k
description: The rexec service is running.
description: The rstat/rstatd service is running.
description: The rpc.rquotad service is running.
description: A version of rusers is running that exposes valid user information to any entity on the network.
description: The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
description: The rwho/rwhod service is running, which exposes machine status and user information.
description: The ident/identd service is running.
description: The NT Alerter and Messenger services are running.
description: The RPC portmapper service is running.
description: The echo service is running.
description: The discard service is running.
description: The systat service is running.
description: The daytime service is running.
description: The chargen service is running.
description: The Gopher service is running.
description: The UUCP service is running.
description: The netstat service is running, which provides sensitive information to remote attackers.
description: The rsh/rlogin service is running.
description: A component service related to NIS+ is running.
description: The OS/2 or POSIX subsystem in NT is enabled.
description: The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
description: WinGate is being used.
description: A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
description: A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
description: A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
description: An application-critical Windows NT registry key has inappropriate permissions.
description: An application-critical Windows NT registry key has an inappropriate value.
description: The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
description: The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
description: The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
description: Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands.
description: Buffer overflow in ToxSoft NextFTP client through CWD command.
description: Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics.
description: Buffer overflow in ALMail32 POP3 client via From: or To: headers.
description: The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
description: Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host.
description: sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack.
description: The WebRamp web administration utility has a default password.
description: A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
description: Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option.
description: Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service.
description: Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
description: Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled.
description: Denial of service in Gauntlet Firewall via a malformed ICMP packet.
description: Denial of service in Sendmail 8.8.6 in HPUX.
description: Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option.
description: Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL.
description: The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
description: Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x.
description: The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
description: HP CDE program includes the current directory in root's PATH variable.
description: Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
description: The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
description: Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
description: Denial of service in AIX ptrace system call allows local users to crash the system.
description: The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.
description: Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
description: SCO Doctor allows local users to gain root privileges through a Tools option.
description: Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux.
description: The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.
description: Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.
description: After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
description: Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
description: OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices.
description: Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
description: Buffer overflow in INN inews program.
description: Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
description: The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization.
description: Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field.
description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
description: The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root.
description: A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable.
description: The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.
description: Vulnerability in Compaq Tru64 UNIX edauth command.
description: Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.
description: Buffer overflow in Windows NT 4.0 help file utility via a malformed help file.
description: A remote attacker can disable the virus warning mechanism in Microsoft Excel 97.
description: IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key.
description: The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code.