The Make-a-Store OrderPage shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The SalesCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The SmartCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The Shoptron shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
Outlook Express 5.01 and Internet Explorer 5.01 allow remote attackers to view a user's email messages via a script that accesses a variable that refe...
The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
Linux apcd program allows local attackers to modify arbitrary files via a symlink attack.
The Intellivend shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The WebSiteTool shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in ...
The shopping cart application provided with Filemaker allows remote users to modify sensitive purchase information via hidden form fields.
Buffer overflow in War FTPd 1.6x allows users to cause a denial of service via long MKD and CWD commands.
Buffer overflows in Tiny FTPd 0.52 beta3 FTP server allows users to execute commands via the STOR, RNTO, MKD, XMKD, RMD, XRMD, APPE, SIZE, and RNFR co...
The Check It Out shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The @Retail shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The Cart32 shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
The CartIt shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.
GNU make follows symlinks when it reads a Makefile from stdin, which allows other local users to execute commands.
NetBSD ptrace call on VAX allows local users to gain privileges by modifying the PSL contents in the debugging process.
Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the pr...
The default installation of Debian GNU/Linux uses an insecure Master Boot Record (MBR) which allows a local user to boot from a floppy disk during the...
Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_b...
Selena Sol WebBanner 4.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Frontpage Server Extensions allows remote attackers to determine the physical path of a virtual directory via a GET request to the htimage.exe CGI pro...
surfCONTROL SuperScout does not properly asign a category to web sites with a . (dot) at the end, which may allow users to bypass web access restricti...
wwwthreads does not properly cleanse numeric data or table names that are passed to SQL queries, which allows remote attackers to gain privileges for ...
The Webspeed configuration program does not properly disable access to the WSMadmin utility, which allows remote attackers to gain privileges via wsis...
Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname.
The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that a...
The Finger Server 0.82 allows remote attackers to execute commands via shell metacharacters.
Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows attackers to cause a denial of service by performing a LIST comman...
The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions.
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.
Axis 700 Network Scanner does not properly restrict access to administrator URLs, which allows users to bypass the password protection via a .. (dot d...
The Java Server in the Novell GroupWise Web Access Enhancement Pack allows remote attackers to cause a denial of service via a long URL to the servlet...
snmpd in SCO OpenServer has an SNMP community string that is writable by default, which allows local attackers to modify the host's configuration.
MySQL 3.22 allows remote attackers to bypass password authentication and access a database via a short check string.
Zeus web server allows remote attackers to view the source code for CGI programs via a null character (%00) at the end of a URL.
Vulnerability in SCO cu program in UnixWare 7.x allows local users to gain privileges.
Internet Anywhere POP3 Mail Server allows remote attackers to cause a denial of service via a large number of connections.
Infopop Ultimate Bulletin Board (UBB) allows remote attackers to execute commands via shell metacharacters in the topic hidden field.
The authentication protocol in Timbuktu Pro 2.0b650 allows remote attackers to cause a denial of service via connections to port 407 and 1417.
The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system pass...
Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewa...
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain p...
IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long name and a .txt.eml extension in the pickup direc...
The installation for Windows 2000 does not activate the Administrator password until the system has rebooted, which allows remote attackers to connect...
ARCserve agent in SCO UnixWare 7.x allows local attackers to gain root privileges via a symlink attack.
procfs in BSD systems allows local users to gain root privileges by modifying the /proc/pid/mem interface via a modified file descriptor for stderr.
The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack.
Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source R...
Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon.
HP Ignite-UX does not save /etc/passwd when it creates an image of a trusted system, which can set the password field to a blank and allow an attacker...
Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when ...
Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not validate an identification number, which allows remote attackers to execute SQL ...
The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes th...
The installation of Sun Internet Mail Server (SIMS) creates a world-readable file that allows local users to obtain passwords.
The Microsoft Active Setup ActiveX component in Internet Explorer 4.x and 5.x allows a remote attacker to install software components without promptin...
asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file.
Buffer overflow in the InterAccess telnet server TelnetD allows remote attackers to execute commands via a long login name.
The lit program in Sun Flex License Manager (FlexLM) follows symlinks, which allows local users to modify arbitrary files.
iPlanet Web Server 4.1 allows remote attackers to cause a denial of service via a large number of GET commands, which consumes memory and causes a ker...
The Windows Media server allows remote attackers to cause a denial of service via a series of client handshake packets that are sent in an improper se...
The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacha...
Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt.
buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters.
setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file.
InterAccess TelnetD Server 4.0 allows remote attackers to conduct a denial of service via malformed terminal client configuration information.
FTP Explorer uses weak encryption for storing the username, password, and profile of FTP sites.
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth progr...
ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event.
The Nautica Marlin bridge allows remote attackers to cause a denial of service via a zero length UDP packet to the SNMP port.
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
EZShopper 3.0 loadpage.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metachar...
EZShopper 3.0 search.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharac...
Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page.
ServerIron switches by Foundry Networks have predictable TCP/IP sequence numbers, which allows remote attackers to spoof or hijack sessions.
HP OpenView OmniBack 2.55 allows remote attackers to cause a denial of service via a large number of connections to port 5555.
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
Buffer overflow in mhshow in the Linux nmh package allows remote attackers to execute commands via malformed MIME headers in an email message.
The Trend Micro OfficeScan client tmlisten.exe allows remote attackers to cause a denial of service via malformed data to port 12345.
The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utiliza...
The default configuration of Serv-U 2.5d and earlier allows remote attackers to determine the real pathname of the server by requesting a URL for a di...
Axis StorPoint CD allows remote attackers to access administrator URLs without authentication via a .. (dot dot) attack.
The htdig (ht://Dig) CGI program htsearch allows remote attackers to read arbitrary files by enclosing the file name with backticks (`) in parameters ...
Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow...