text
stringlengths 0
383k
|
---|
description: The rexec service is running. |
description: The rstat/rstatd service is running. |
description: The rpc.rquotad service is running. |
description: A version of rusers is running that exposes valid user information to any entity on the network. |
description: The rexd service is running, which uses weak authentication that can allow an attacker to execute commands. |
description: The rwho/rwhod service is running, which exposes machine status and user information. |
description: The ident/identd service is running. |
description: The NT Alerter and Messenger services are running. |
description: The RPC portmapper service is running. |
description: The echo service is running. |
description: The discard service is running. |
description: The systat service is running. |
description: The daytime service is running. |
description: The chargen service is running. |
description: The Gopher service is running. |
description: The UUCP service is running. |
description: The netstat service is running, which provides sensitive information to remote attackers. |
description: The rsh/rlogin service is running. |
description: A component service related to NIS+ is running. |
description: The OS/2 or POSIX subsystem in NT is enabled. |
description: The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names. |
description: WinGate is being used. |
description: A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6. |
description: A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete. |
description: A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified. |
description: An application-critical Windows NT registry key has inappropriate permissions. |
description: An application-critical Windows NT registry key has an inappropriate value. |
description: The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service. |
description: The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. |
description: The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. |
description: Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands. |
description: Buffer overflow in ToxSoft NextFTP client through CWD command. |
description: Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics. |
description: Buffer overflow in ALMail32 POP3 client via From: or To: headers. |
description: The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. |
description: Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host. |
description: sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. |
description: The WebRamp web administration utility has a default password. |
description: A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server. |
description: Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option. |
description: Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service. |
description: Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL. |
description: Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled. |
description: Denial of service in Gauntlet Firewall via a malformed ICMP packet. |
description: Denial of service in Sendmail 8.8.6 in HPUX. |
description: Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option. |
description: Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL. |
description: The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. |
description: Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x. |
description: The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. |
description: HP CDE program includes the current directory in root's PATH variable. |
description: Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. |
description: The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges. |
description: Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges. |
description: Denial of service in AIX ptrace system call allows local users to crash the system. |
description: The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack. |
description: Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). |
description: SCO Doctor allows local users to gain root privileges through a Tools option. |
description: Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux. |
description: The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs. |
description: Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file. |
description: After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. |
description: Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability. |
description: OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices. |
description: Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. |
description: Buffer overflow in INN inews program. |
description: Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables. |
description: The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization. |
description: Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field. |
description: The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. |
description: The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root. |
description: A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable. |
description: The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges. |
description: Vulnerability in Compaq Tru64 UNIX edauth command. |
description: Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry. |
description: Buffer overflow in Windows NT 4.0 help file utility via a malformed help file. |
description: A remote attacker can disable the virus warning mechanism in Microsoft Excel 97. |
description: IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key. |
description: The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code. |