CVE Database

Search and browse vulnerability records from NVD

Showing 45 of 21545 CVEs

CVE ID Severity Description EPSS Published
7.5 HIGH

SMB dissector in Ethereal 0.9.3 and earlier allows remote attackers to cause a denial of service (crash) or execute arbitrary code via malformed packets that cause Ethereal to dereference a NULL pointer.

7.7% 2002-06-18
7.8 HIGH

Sudo before 1.6.6 contains an off-by-one error that can result in a heap-based buffer overflow that may allow local users to gain root privileges via special characters in the -p (prompt) argument, which are not properly expanded.

0.2% 2002-05-16
7.8 HIGH

Windows 2000 allows local users to prevent the application of new group policy settings by opening Group Policy files with exclusive-read access.

0.8% 2002-04-04
7.5 HIGH

Macintosh clients, when using NT file system volumes on Windows 2000 SP1, create subdirectories and automatically modify the inherited NTFS permissions, which may cause the directories to have less restrictive permissions than intended.

0.9% 2001-12-31
7.5 HIGH

Autogalaxy stores usernames and passwords in cleartext in cookies, which makes it easier for remote attackers to obtain authentication information and gain unauthorized access via sniffing or a cross-site scripting attack.

0.8% 2001-12-31
7.5 HIGH

The default "basic" security setting' in config.php for TWIG webmail 2.7.4 and earlier stores cleartext usernames and passwords in cookies, which could allow attackers to obtain authentication information and gain privileges.

0.2% 2001-12-31
7.8 HIGH

Pathways Homecare 6.5 uses weak encryption for user names and passwords, which allows local users to gain privileges by recovering the passwords from the pwhc.ini file.

0.1% 2001-12-31
7.5 HIGH

Cerberus FTP server 1.0 - 1.5 allows remote attackers to cause a denial of service (crash) via a large number of "PASV" requests.

1.0% 2001-12-06
7.5 HIGH

6tunnel 0.08 and earlier does not properly close sockets that were initiated by a client, which allows remote attackers to cause a denial of service (resource exhaustion) by repeatedly connecting to and disconnecting from the server.

9.0% 2001-12-06
7.5 HIGH

ValiCert Enterprise Validation Authority (EVA) Administration Server 3.3 through 4.2.1 uses insufficiently random data to (1) generate session tokens for HSMs using the C rand function, or (2) generate certificates or keys using /dev/urandom instead of another source which blocks when the entropy pool is low, which could make it easier for local or remote attackers to steal tokens or certificates via brute force guessing.

1.6% 2001-12-04
7.3 HIGH

Internet Explorer 6 and earlier, when used with the Telnet client in Services for Unix (SFU) 2.0, allows remote attackers to execute commands by spawning Telnet with a log file option on the command line and writing arbitrary code into an executable file which is later executed, aka a new variant of the Telnet Invocation vulnerability as described in CVE-2001-0150.

1.6% 2001-10-30
7.5 HIGH

Perception LiteServe 1.25 allows remote attackers to obtain source code of CGI scripts via URLs that contain MS-DOS conventions such as (1) upper case letters or (2) 8.3 file names.

0.7% 2001-10-18
7.5 HIGH

By default, DNS servers on Windows NT 4.0 and Windows 2000 Server cache glue records received from non-delegated name servers, which allows remote attackers to poison the DNS cache via spoofed DNS responses.

4.0% 2001-08-31
8.8 HIGH

prefs.php in phpBB 1.4.0 and earlier allows remote authenticated users to execute arbitrary PHP code via an invalid language value, which prevents the variables (1) $l_statsblock in prefs.php or (2) $l_privnotify in auth.php from being properly initialized, which can be modified by the user and later used in an eval statement.

1.2% 2001-07-31
7.8 HIGH

dnskeygen in BIND 8.2.4 and earlier, and dnssec-keygen in BIND 9.1.2 and earlier, set insecure permissions for a HMAC-MD5 shared secret key file used for DNS Transactional Signatures (TSIG), which allows attackers to obtain the keys and perform dynamic DNS updates.

0.1% 2001-07-21
7.8 HIGH

Task Manager in Windows 2000 does not allow local users to end processes with uppercase letters named (1) winlogon.exe, (2) csrss.exe, (3) smss.exe and (4) services.exe via the Process tab which could allow local users to install Trojan horses that cannot be stopped with the Task Manager.

0.5% 2001-07-16
7.5 HIGH

Transsoft Broker 5.9.5.0 allows remote attackers to read arbitrary files and directories by uploading a .lnk (link) file that points to the target file.

1.6% 2001-07-02
7.5 HIGH

ArGoSoft FTP Server 1.2.2.2 allows remote attackers to read arbitrary files and directories by uploading a .lnk (link) file that points to the target file.

1.8% 2001-07-01
7.5 HIGH

WFTPD 3.00 allows remote attackers to read arbitrary files by uploading a (link) file that ends in a ".lnk." extension, which bypasses WFTPD's check for a ".lnk" extension.

0.7% 2001-07-01
7.5 HIGH

FTP service in IIS 5.0 and earlier allows remote attackers to cause a denial of service via a wildcard sequence that generates a long string when it is expanded.

30.6% 2001-06-27
7.8 HIGH

sash before 3.4-4 in Debian GNU/Linux does not properly clone /etc/shadow, which makes it world-readable and could allow local users to gain privileges via password cracking.

0.1% 2001-03-26
7.1 HIGH

The Winsock2ProtocolCatalogMutex mutex in Windows NT 4.0 has inappropriate Everyone/Full Control permissions, which allows local users to modify the permissions to "No Access" and disable Winsock network connectivity to cause a denial of service, aka the "Winsock Mutex" vulnerability.

0.1% 2001-02-12
7.5 HIGH

IBM WebSphere server 3.0.2 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case.

0.7% 2000-06-08
7.5 HIGH

Unify eWave ServletExec allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case.

1.6% 2000-06-08
7.5 HIGH

The default configuration of BEA WebLogic 3.1.8 through 4.5.1 allows a remote attacker to view source code of a JSP program by requesting a URL which provides the JSP extension in upper case.

1.4% 2000-06-08
7.5 HIGH

Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."

2.5% 2000-04-28
7.5 HIGH

IIS 4.0 and 5.0 allows remote attackers to cause a denial of service by sending many URLs with a large number of escaped characters, aka the "Myriad Escaped Characters" Vulnerability.

20.3% 2000-04-12
7.5 HIGH

Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.

30.0% 1999-12-31
7.8 HIGH

Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local attacker to read a "secure" hidden form value from a temporary file and craft a LYNXOPTIONS: URL that causes Lynx to modify the user's configuration file and execute commands.

0.2% 1999-11-16
8.2 HIGH

Internet Explorer 5.0 allows a remote server to read arbitrary files on the client's file system using the Microsoft Scriptlet Component.

1.9% 1999-04-09
7.5 HIGH

Off-by-one error in NcFTPd FTP server before 2.4.1 allows a remote attacker to cause a denial of service (crash) via a long PORT command.

1.4% 1999-01-01
7.5 HIGH

IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.

1.1% 1998-11-04
7.5 HIGH

Compaq/Microcom 6000 Access Integrator does not disconnect a client after a certain number of failed login attempts, which allows remote attackers to guess usernames or passwords via a brute force attack.

0.7% 1998-06-03
8.4 HIGH

Solaris ufsrestore buffer overflow.

0.7% 1998-04-29
7.0 HIGH

Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.

0.7% 1998-02-06
8.4 HIGH

Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.

0.5% 1998-01-22
7.5 HIGH

Netscape FastTrack Web server lists files when a lowercase "get" command is used instead of an uppercase GET.

4.1% 1998-01-01
8.4 HIGH

root privileges via buffer overflow in ordist command on SGI IRIX systems.

0.4% 1997-07-16
7.3 HIGH

IRIX fam service allows an attacker to obtain a list of all files on the server.

0.7% 1997-07-14
8.4 HIGH

IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.

0.8% 1997-05-26
7.3 HIGH

webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter.

20.7% 1997-05-06
8.4 HIGH

Buffer overflow in xlock program allows local users to execute commands as root.

0.1% 1997-04-26
7.5 HIGH

ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs.

17.6% 1997-01-01
7.8 HIGH

Local user gains root privileges via buffer overflow in rdist, via expstr() function.

0.2% 1996-07-03
8.4 HIGH

Certain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0.

0.1% 1990-05-01