A remote attacker can read information from a Netscape user's cache via JavaScript.
Microsoft Excel 97 and 2000 does not warn the user when executing Excel Macro Language (XLM) macros in external text files, which could allow an attac...
Buffer overflow in the RealNetworks RealPlayer client versions 6 and 7 allows remote attackers to cause a denial of service via a long Location URL.
Allaire Forums 2.0.5 allows remote attackers to bypass access restrictions to secure conferences via the rightAccessAllForums or rightModerateAllForum...
The web administration interface for CommuniGate Pro 3.2.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Buffer overflow in WebObjects.exe in the WebObjects Developer 4.5 package allows remote attackers to cause a denial of service via an HTTP request wit...
The Nbase-Xyplex EdgeBlaster router allows remote attackers to cause a denial of service via a scan for the FormMail CGI program.
HP-UX 11.04 VirtualVault (VVOS) sends data to unprivileged processes via an interface that has multiple aliased IP addresses.
The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accou...
Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command.
BeOS allows remote attackers to cause a denial of service via malformed packets whose length field is less than the length of the headers.
The unattended installation of Windows 2000 with the OEMPreinstall option sets insecure permissions for the All Users and Default Users directories.
PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt.
The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name.
CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate...
BeOS 4.5 and 5.0 allow local users to cause a denial of service via malformed direct system calls using interrupt 37.
Buffer overflow in healthd for FreeBSD allows local users to gain root privileges.
The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.
The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init befor...
The dansie shopping cart application cart.pl allows remote attackers to execute commands via a shell metacharacters in a form variable.
The dansie shopping cart application cart.pl allows remote attackers to modify sensitive purchase information via hidden form fields.
IIS 4.0 and 5.0 allows remote attackers to cause a denial of service by sending many URLs with a large number of escaped characters, aka the "Myriad E...
The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise...
The AVM KEN! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.
The AVM KEN! ISDN Proxy server allows remote attackers to cause a denial of service via a malformed request.
TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webpl...
The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon.
The BizDB CGI script bizdb-search.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the dbname parameter.
Infonautics getdoc.cgi allows remote attackers to bypass the payment phase for accessing documents via a modified form variable.
The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.
The dansie shopping cart application cart.pl allows remote attackers to obtain the shopping cart database and configuration information via a URL that...
Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0 allows users to cause a denial of service or execute commands, aka the "Link Vi...
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which c...
The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request.
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
Buffer overflow in XFree86 3.3.x allows local users to execute arbitrary commands via a long -xkbmap parameter.
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
Buffer overflow in Star Office 5.1 allows attackers to cause a denial of service by embedding a long URL within a document.
Panda Security 3.0 with registry editing disabled allows users to edit the registry and gain privileges by directly executing a .reg file or using oth...
Panda Security 3.0 allows users to uninstall the Panda software via its Add/Remove Programs applet.
HP asecure creates the Audio Security File audio.sec with insecure permissions, which allows local users to cause a denial of service or gain addition...
Internet Explorer 5.01 allows remote attackers to bypass the cross frame security policy via a malicious applet that interacts with the Java JSObject ...
Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communica...
The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.
read-passwd and other Lisp functions in Emacs 20 do not properly clear the history of recently typed keys, which allows an attacker to read unencrypte...
Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise av...
Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long U...
The Adtran MX2800 M13 Multiplexer allows remote attackers to cause a denial of service via a ping flood to the Ethernet interface, which causes the de...
Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.
Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to ...
RealNetworks RealServer allows remote attackers to cause a denial of service by sending malformed input to the server at port 7070.
The Windows 2000 domain controller allows a malicious user to modify Active Directory information by modifying an unprotected attribute, aka the "Mixe...
Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long e...
Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command.
Atrium Mercur Mail Server 3.2 allows local attackers to read other user's email and create arbitrary files via a dot dot (..) attack.
Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a deni...
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows other local users to read potentially sensitive inf...
IMP does not remove files properly if the MSWordView application quits, which allows local users to cause a denial of service by filling up the disk s...
mail.local in Sendmail 8.10.x does not properly identify the .\n string which identifies the end of message text, which allows a remote attacker to ca...
Concurrent Versions Software (CVS) uses predictable temporary file names for locking, which allows local users to cause a denial of service by creatin...
The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to e...
Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option.
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
Buffer overflow in IC Radius package allows a remote attacker to cause a denial of service via a long user name.
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
The Allaire Spectra container editor preview tool does not properly enforce object security, which allows an attacker to conduct unauthorized activiti...
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules.
pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap.
Meeting Maker uses weak encryption (a polyalphabetic substitution cipher) for passwords, which allows remote attackers to sniff and decrypt passwords ...
The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program.
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a ...
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
A backdoor password in Cart32 3.0 and earlier allows remote attackers to execute arbitrary commands.
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers...
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable.