text
stringlengths 0
383k
|
---|
description: The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users. |
description: Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request. |
description: The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages. |
description: The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input. |
description: Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function. |
description: When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page". |
description: An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header. |
description: A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted. |
description: A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them. |
description: Buffer overflow in Lotus Notes LDAP (NLDAP) allows an attacker to conduct a denial of service through the ldap_search request. |
description: The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack. |
description: The KDE klock program allows local users to unlock a session using malformed input. |
description: The logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files using symbolic links. |
description: Buffer overflow in VMWare 1.0.1 for Linux via a long HOME environmental variable. |
description: A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication. |
description: KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories. |
description: The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. |
description: The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. |
description: The code.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. |
description: The codebrws.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files. |
description: Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable. |
description: QMS CrownNet Unix Utilities for 2060 allows root to log on without a password. |
description: The Debian mailman package uses weak authentication, which allows attackers to gain privileges. |
description: Trn allows local users to overwrite other users' files via symlinks. |
description: Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request. |
description: Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler. |
description: A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service. |
description: Denial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load. |
description: Buffer overflows in Red Hat net-tools package. |
description: Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument. |
description: Hotmail allows Javascript to be executed via the HTML STYLE tag, allowing remote attackers to execute commands on the user's Hotmail account. |
description: Buffer overflow in Accept command in Netscape Enterprise Server 3.6 with the SSL Handshake Patch. |
description: Denial of service in Netscape Enterprise Server via a buffer overflow in the SSL handshake. |
description: The w3-msql CGI script provided with Mini SQL allows remote attackers to view restricted directories. |
description: The INN inndstart program allows local users to gain privileges by specifying an alternate configuration file using the INNCONF environmental variable. |
description: Windows NT RRAS and RAS clients cache a user's password even if the user has not selected the "Save password" option. |
description: ColdFusion Administrator with Advanced Security enabled allows remote users to stop the ColdFusion server via the Start/Stop utility. |
description: The ColdFusion CFCRYPT program for encrypting CFML templates has weak encryption, allowing attackers to decrypt the templates. |
description: Netscape Enterprise 3.5.1 and FastTrack 3.01 servers allow a remote attacker to view source code to scripts by appending a %20 to the script's URL. |
description: Buffer overflow in FuseMAIL POP service via long USER and PASS commands. |
description: Undocumented ColdFusion Markup Language (CFML) tags and functions in the ColdFusion Administrator allow users to gain additional privileges. |
description: Buffer overflow in FreeBSD fts library routines allows local user to modify arbitrary files via the periodic program. |
description: When Javascript is embedded within the TITLE tag, Netscape Communicator allows a remote attacker to use the "about" protocol to gain access to browser information. |
description: NetBSD on a multi-homed host allows ARP packets on one network to modify ARP entries on another connected network. |
description: NetBSD allows ARP packets to overwrite static ARP entries. |
description: SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor. |
description: The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment. |
description: Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable. |
description: Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable. |
description: Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable. |
description: Firewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an attacker to conduct a denial of service via a large number of connection attempts to unresponsive systems. |
description: The web components of Compaq Management Agents and the Compaq Survey Utility allow a remote attacker to read arbitrary files via a .. (dot dot) attack. |
description: Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301. |
description: Buffer overflow in Solaris lpset program allows local users to gain root access. |
description: Buffer overflows in Mars NetWare Emulation (NWE, mars_nwe) package via long directory names. |
description: Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list. |
description: Alibaba HTTP server allows remote attackers to read files via a .. (dot dot) attack. |
description: IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have "No Access" permissions. |
description: Buffer overflow in Xi Graphics Accelerated-X server allows local users to gain root access via a long display or query parameter. |
description: Denial of service in HP-UX SharedX recserv program. |
description: KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file. |
description: KDE allows local users to execute arbitrary commands by setting the KDEDIR environmental variable to modify the search path that KDE uses to locate its executables. |
description: KDE kppp allows local users to create a directory in an arbitrary location via the HOME environmental variable. |
description: FreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system. |
description: Denial of service in Oracle TNSLSNR SQL*Net Listener via a malformed string to the listener port, aka NERP. |
description: The INN inndstart program allows local users to gain root privileges via the "pathrun" parameter in the inn.conf file. |
description: The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. |
description: The SSH authentication agent follows symlinks via a UNIX domain socket. |
description: Arkiea nlservd allows remote attackers to conduct a denial of service. |
description: Buffer overflow in AIX ftpd in the libc library. |
description: A remote attacker can read information from a Netscape user's cache via JavaScript. |
description: Hybrid Network cable modems do not include an authentication mechanism for administration, allowing remote attackers to compromise the system through the HSMP protocol. |
description: ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration. |
description: Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet. |
description: Microsoft Excel does not warn a user when a macro is present in a Symbolic Link (SYLK) format file. |
description: The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches. |
description: FreeBSD T/TCP Extensions for Transactions can be subjected to spoofing attacks. |
description: NIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries. |
description: Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type. |
description: Buffer overflow in bootpd 2.4.3 and earlier via a long boot file location. |
description: The GetFile.cfm file in Allaire Forums allows remote attackers to read files through a parameter to GetFile.cfm. |
description: BMC Patrol allows remote attackers to gain access to an agent by spoofing frames. |
description: Buffer overflow in Internet Explorer 5 allows remote attackers to execute commands via a malformed Favorites icon. |
description: The fwluser script in AIX eNetwork Firewall allows local users to write to arbitrary files via a symlink attack. |
description: Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths. |
description: Novell NetWare Transaction Tracking System (TTS) in Novell 4.11 and earlier allows remote attackers to cause a denial of service via a large number of requests. |
description: Buffer overflow in Solaris dtprintinfo program. |
description: The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users. |
description: Multiple buffer overflows in ISC DHCP Distribution server (dhcpd) 1.0 and 2.0 allow a remote attacker to cause a denial of service (crash) and possibly execute arbitrary commands via long options. |
description: Netscape Communicator 4.x with Javascript enabled does not warn a user of cookie settings, even if they have selected the option to "Only accept cookies originating from the same server as the page being viewed". |
description: Denial of service in Samba NETBIOS name service daemon (nmbd). |
description: Buffer overflow in Samba smbd program via a malformed message command. |
description: Race condition in Samba smbmnt allows local users to mount file systems in arbitrary locations. |
description: Cfingerd with ALLOW_EXECUTION enabled does not properly drop privileges when it executes a program on behalf of the user, allowing local users to gain root privileges. |
description: Red Hat pump DHCP client allows remote attackers to gain root access in some configurations. |
description: Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries. |
description: The Motorola CableRouter allows any remote user to connect to and configure the router on port 1024. |
description: Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. telnet. |
description: Buffer overflow in Solaris kcms_configure via a long NETPATH environmental variable. |
description: NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it. |
Subsets and Splits