text
stringlengths
0
383k
description: Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command.
description: BMC Patrol allows any remote attacker to flood its UDP port, causing a denial of service.
description: An example application in ColdFusion Server 4.0 allows remote attackers to view source code via the sourcewindow.cfm file.
description: Sample runnable code snippets in ColdFusion Server 4.0 allow remote attackers to read files, conduct a denial of service, or use the server as a proxy for other HTTP calls.
description: The Syntax Checker in ColdFusion Server 4.0 allows remote attackers to conduct a denial of service.
description: UnityMail allows remote attackers to conduct a denial of service via a large number of MIME headers.
description: Apache allows remote attackers to conduct a denial of service via a large number of MIME headers.
description: NTMail allows remote attackers to read arbitrary files via a .. (dot dot) attack.
description: Buffer overflow in SmartDesk WebSuite allows remote attackers to cause a denial of service via a long URL.
description: Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests.
description: wwwboard allows a remote attacker to delete message board articles via a malformed argument.
description: Buffer overflow in Mediahouse Statistics Server allows remote attackers to execute commands.
description: Mediahouse Statistics Server allows remote attackers to read the administrator password, which is stored in cleartext in the ss.cfg file.
description: TeamTrack web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
description: classifieds.cgi allows remote attackers to read arbitrary files via shell metacharacters.
description: classifieds.cgi allows remote attackers to execute arbitrary commands by specifying them in a hidden variable in a CGI form.
description: BNBSurvey survey.cgi program allows remote attackers to execute commands via shell metacharacters.
description: BNBForm allows remote attackers to read arbitrary files via the automessage hidden form variable.
description: MBone SDR Package allows remote attackers to execute commands via shell metacharacters in Session Initiation Protocol (SIP) messages.
description: Denial of service in Debian IRC Epic/epic4 client via a long string.
description: Buffer overflow in mutt mail client allows remote attackers to execute commands via malformed MIME messages.
description: Mutt mail client allows a remote attacker to execute commands via shell metacharacters.
description: UnixWare dos7utils allows a local user to gain root privileges by using the STATICMERGE environmental variable to find a script which it executes.
description: Buffer overflow in OpenLink 3.2 allows remote attackers to gain privileges via a long GET request to the web configurator.
description: IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.
description: Buffer overflow in Internet Mail Service (IMS) for Microsoft Exchange 5.5 and 5.0 allows remote attackers to conduct a denial of service via AUTH or AUTHINFO commands.
description: Buffer overflow in Yamaha MidiPlug via a Text variable in an EMBED tag.
description: AN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow remote attackers to execute commands via shell metacharacters.
description: Buffer overflow in uum program for Canna input system allows local users to gain root privileges.
description: Buffer overflow in canuum program for Canna input system allows local users to gain root privileges.
description: Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
description: Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.
description: Buffer overflow in Solaris lpstat via class argument allows local users to gain root access.
description: WWWBoard stores encrypted passwords in a password file that is under the web root and thus accessible by remote attackers.
description: WWWBoard has a default username and default password.
description: Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command.
description: The NeXT NetInfo _writers property allows local users to gain root privileges or conduct a denial of service.
description: MajorCool mj_key_cache program allows local users to modify files via a symlink attack.
description: sudo 1.5.x allows local users to execute arbitrary commands via a .. (dot dot) attack.
description: IRIX startmidi program allows local users to modify arbitrary files via a symlink attack.
description: IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option.
description: HPUX sysdiag allows local users to gain root privileges via a symlink attack during log file creation.
description: Buffer overflow in HPUX passwd command allows local users to gain root privileges via a command line option.
description: FreeBSD mount_union command allows local users to gain root privileges via a symlink attack.
description: Buffer overflow in FreeBSD setlocale in the libc module allows attackers to execute arbitrary code via a long PATH_LOCALE environment variable.
description: Race condition in xterm allows local users to modify arbitrary files via the logging option.
description: Buffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0].
description: Buffer overflow in the HTML library used by Internet Explorer, Outlook Express, and Windows Explorer via the res: local resource protocol.
description: Buffer overflow in BNC IRC proxy allows remote attackers to gain privileges.
description: The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork.
description: The OmniHTTPD visadmin.exe program allows a remote attacker to conduct a denial of service via a malformed URL which causes a large number of temporary files to be created.
description: Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file.
description: Buffer overflow in Xshipwars xsw program.
description: Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode.
description: Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service.
description: The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed.
description: Sendmail allows local users to reinitialize the aliases database via the newaliases command, then cause a denial of service by interrupting Sendmail.
description: Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request.
description: htdig allows remote attackers to execute commands via filenames with shell metacharacters.
description: The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.
description: Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request.
description: Internet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka "Server-side Page Reference Redirect."
description: The Sun Web-Based Enterprise Management (WBEM) installation script stores a password in plaintext in a world readable file.
description: Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
description: Matt's Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
description: CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry.
description: The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option.
description: Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name.
description: UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack.
description: Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol.
description: Error messages generated by gdm with the VerboseAuth setting allows an attacker to identify valid users on a system.
description: Buffer overflow in GoodTech Telnet Server NT allows remote users to cause a denial of service via a long login name.
description: HP VirtualVault with the PHSS_17692 patch allows unprivileged processes to bypass access restrictions via the Trusted Gateway Proxy (TGP).
description: Modifications to ACLs (Access Control Lists) in Microsoft Exchange 5.5 do not take effect until the directory store cache is refreshed.
description: Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords.
description: Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka "Malformed Security Identifier Request."
description: Buffer overflow in Infoseek Ultraseek search engine allows remote attackers to execute commands via a long GET request.
description: wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress.
description: Cisco Cache Engine allows an attacker to replace content in the cache.
description: Microsoft SQL 7.0 server allows a remote attacker to cause a denial of service via a malformed TDS packet.
description: The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics.
description: Cisco Cache Engine allows a remote attacker to gain access via a null username and password.
description: Netscape Navigator uses weak encryption for storing a user's Netscape mail password.
description: War FTP Daemon 1.70 allows remote attackers to cause a denial of service by flooding it with connections.
description: Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command.
description: Groupwise web server GWWEB.EXE allows remote attackers to read arbitrary files with .htm extensions via a .. (dot dot) attack using the HELP parameter.
description: Groupwise web server GWWEB.EXE allows remote attackers to determine the real path of the web server via the HELP parameter.
description: Buffer overflow in VDO Live Player allows remote attackers to execute commands on the VDO client via a malformed .vdo file.
description: xsoldier program allows local users to gain root access via a long argument.
description: The Disney Go Express Search allows remote attackers to access and modify search information for users by connecting to an HTTP server on the user's system.
description: An SSH 1.2.27 server allows a client to use the "none" cipher, even if it is not allowed by the server policy.
description: The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands.
description: SMTP component of Lotus Domino 4.6.1 on AS/400, and possibly other operating systems, allows a remote attacker to crash the mail server via a long string.
description: named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file.
description: Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument.
description: Buffer overflow in Apple AppleShare Mail Server 5.0.3 on MacOS 8.1 and earlier allows a remote attacker to cause a denial of service (crash) via a long HELO command.
description: Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell.
description: Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message.
description: IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets.
description: SpectroSERVER in Cabletron Spectrum Enterprise Manager 5.0 installs a directory tree with insecure permissions, which allows local users to replace a privileged executable (processd) with a Trojan horse, facilitating a root or Administrator compromise.