Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x.
HP CDE program includes the current directory in root's PATH variable.
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization.
Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set.
BSD 4.4 based operating systems, when running at security level 1, allow the root user to clear the immutable and append-only flags for files by unmou...
Denial of service in various Windows systems via malformed, fragmented IGMP packets.
A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.
Denial of service in Netscape Enterprise Server via a buffer overflow in the SSL handshake.
The Sun HotSpot Performance Engine VM allows a remote attacker to cause a denial of service on any server running HotSpot via a URL that includes the ...
IIS 3.x and 4.x does not distinguish between pages requiring encryption and those that do not, which allows remote attackers to cause a denial of serv...
Netscape Communicator 4.x with Javascript enabled does not warn a user of cookie settings, even if they have selected the option to "Only accept cooki...
MacOS uses weak encryption for passwords that are stored in the Users & Groups Data File.
Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel mem...
BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as root by specifying the target file as the second a...
Joe's Own Editor (joe) 2.8 sets the world-readable permission on its crash-save file, DEADJOE, which could allow local users to read files that were b...
Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spo...
Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g.,...
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows...
dbmlparser.exe CGI guestbook program does not perform a chroot operation properly, which allows remote attackers to read arbitrary files.
Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request.
Buffer overflow in AspUpload.dll in Persits Software AspUpload before 1.4.0.2 allows remote attackers to cause a denial of service, and possibly execu...
Vulnerability in a script in Texas A&M University (TAMU) Tiger allows local users to execute arbitrary commands as the Tiger user, usually root.
Denial of service in Samba NETBIOS name service daemon (nmbd).
Buffer overflow in Samba smbd program via a malformed message command.
GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a ...
Delegate proxy 5.9.3 and earlier creates files and directories in the DGROOT with world-writable permissions.
Denial of service in Windows NT messenger service through a long username.
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attacker...
IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker t...
Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malici...
The Microsoft Jet database engine allows an attacker to modify text files via a database query, aka the "Text I-ISAM" vulnerability.
Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.
Firewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an attacker to conduct a denial of service vi...
WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain ...
Denial of service in Gauntlet Firewall via a malformed ICMP packet.
Default configuration of the search engine in Netscape Enterprise Server 3.5.1, and possibly other versions, allows remote attackers to read the sourc...
Ethereal allows local users to overwrite arbitrary files via a symlink attack on the packet capture file.
.sbstart startup script in AcuShop Salesbuilder is world writable, which allows local users to gain privileges by appending commands to the file.