text
stringlengths 0
383k
|
---|
description: FreeBSD seyon allows users to gain privileges via a modified PATH variable for finding the xterm and seyon-emu commands. |
description: FreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulator argument. |
description: Buffer overflow in Qpopper (qpop) 3.0 allows remote root access via AUTH command. |
description: Buffer overflow in FreeBSD xmindpath allows local users to gain privileges via -f argument. |
description: A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users. |
description: The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail. |
description: Buffer overflow in FreeBSD angband allows local users to gain privileges. |
description: By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing. |
description: UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission. |
description: HP Secure Web Console uses weak encryption. |
description: Buffer overflow in SCO UnixWare Xsco command via a long argument. |
description: Denial of service in Linux syslogd via a large number of connections. |
description: Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname. |
description: Buffer overflow in BIND 8.2 via NXT records. |
description: Buffer overflow in RSAREF2 via the encryption and decryption functions in the RSAREF library. |
description: Denial of service in BIND named via malformed SIG records. |
description: UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack. |
description: Denial of service in BIND by improperly closing TCP sessions via so_linger. |
description: Buffer overflow in Serv-U FTP 2.5 allows remote users to conduct a denial of service via the SITE command. |
description: Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled. |
description: Buffer overflow in CDE dtmail and dtmailpr programs allows local users to gain privileges via a long -f option. |
description: Buffer overflow in CDE mailtool allows local users to gain root privileges via a long MIME Content-Type. |
description: Symantec Mail-Gear 1.0 web interface server allows remote users to read arbitrary files via a .. (dot dot) attack. |
description: Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port. |
description: Denial of service in MDaemon WorldClient and WebConfig services via a long URL. |
description: Buffer overflow in SCO su program allows local users to gain root access via a long username. |
description: Denial of service in MDaemon 2.7 via a large number of connection attempts. |
description: Buffer overflow in free internet chess server (FICS) program, xboard. |
description: Denial of service in BIND named via consuming more than "fdmax" file descriptors. |
description: Denial of service in BIND named via maxdname. |
description: The default permissions for Endymion MailMan allow local users to read email or modify files. |
description: Denial of service in BIND named via naptr. |
description: IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin. |
description: Buffer overflow in Netscape Enterprise Server and Netscape FastTrack Server allows remote attackers to gain privileges via the HTTP Basic Authentication procedure. |
description: Ultimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to view the data if an error occurs when the HTTP server attempts to execute the file. |
description: Buffer overflow in FreeBSD gdc program. |
description: login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist. |
description: FreeBSD gdc program allows local users to modify files via a symlink attack. |
description: Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server. |
description: Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly. |
description: Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack. |
description: Race condition in the SSL ISAPI filter in IIS and other servers may leak information in plaintext. |
description: Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privileges by reading a plaintext password file. |
description: Buffer overflow in FreeBSD seyon via HOME environmental variable, -emulator argument, -modems argument, or the GUI. |
description: UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file. |
description: Buffer overflow in CommuniGatePro via a long string to the HTTP configuration port. |
description: Buffer overflow in UnixWare xauto program allows local users to gain root privilege. |
description: Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers. |
description: ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN. |
description: Internet Explorer 3.x to 4.01 allows a remote attacker to insert malicious content into a frame of another web site, aka frame spoofing. |
description: Internet Explorer 4.01 allows remote attackers to read arbitrary files by pasting a file name into the file upload control, aka untrusted scripted paste. |
description: Internet Explorer 4.0 and 4.01 allow a remote attacker to read files via IE's cross frame security, aka the "Cross Frame Navigate" vulnerability. |
description: Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. |
description: Buffer overflow in Skyfull mail server via MAIL FROM command. |
description: Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions. |
description: DHCP clients with ICMP Router Discovery Protocol (IRDP) enabled allow remote attackers to modify their default routes. |
description: Buffer overflow in Internet Explorer 4.0 via EMBED tag. |
description: Internet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME. |
description: Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR. |
description: Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file. |
description: Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly. |
description: Falcon web server allows remote attackers to read arbitrary files via a .. (dot dot) attack. |
description: Falcon web server allows remote attackers to determine the absolute path of the web root via long file names. |
description: Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine. |
description: The Zeus web server administrative interface uses weak encryption for its passwords. |
description: Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL. |
description: The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager. |
description: FTGate web interface server allows remote attackers to read files via a .. (dot dot) attack. |
description: dbsnmp in Oracle Intelligent Agent allows local users to gain privileges by setting the ORACLE_HOME environmental variable, which dbsnmp uses to find the nmiconf.tcl script. |
description: Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set. |
description: iHTML Merchant allows remote attackers to obtain sensitive information or execute commands via a code parsing error. |
description: The "download behavior" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect. |
description: Buffer overflow in Netscape Communicator before 4.7 via a dynamic font whose length field is less than the size of the font. |
description: userOsa in SCO OpenServer allows local users to corrupt files via a symlink attack. |
description: Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals. |
description: Firewall-1 does not properly restrict access to LDAP attributes. |
description: Buffer overflow in RealNetworks RealServer administration utility allows remote attackers to execute arbitrary commands via a long username and password. |
description: iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) attack. |
description: Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request. |
description: The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider. |
description: Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation. |
description: ypserv allows a local user to modify the GECOS and login shells of other users. |
description: ypserv allows local administrators to modify password tables. |
description: genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767. |
description: Buffer overflow in BFTelnet allows remote attackers to cause a denial of service via a long username. |
description: Denial of service in Axent Raptor firewall via malformed zero-length IP options. |
description: Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable. |
description: sccw allows local users to read arbitrary files. |
description: Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter. |
description: Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the "Spoofed Route Pointer" vulnerability. |
description: Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user. |
description: Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories. |
description: FreeBSD VFS cache (vfs_cache) allows local users to cause a denial of service by opening a large number of files. |
description: dfire.cgi script in Dragon-Fire IDS allows remote users to execute commands via shell metacharacters. |
description: Buffer overflow in the FTP client in the Debian GNU/Linux netstd package. |
description: URL Live! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack. |
description: WebTrends software stores account names and passwords in a file which does not have restricted access permissions. |
description: The Preloader ActiveX control used by Internet Explorer allows remote attackers to read arbitrary files. |
description: Denial of service in various Windows systems via malformed, fragmented IGMP packets. |
description: A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections. |