text
stringlengths
0
383k
description: ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.
description: Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
description: Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
description: MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook.
description: Arbitrary command execution via IMAP buffer overflow in authenticate command.
description: Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command.
description: Information from SSL-encrypted sessions via PKCS #1.
description: Buffer overflow in NIS+, in Sun's rpc.nisd program.
description: Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
description: Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
description: Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
description: Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names.
description: Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user.
description: Unauthorized privileged access or denial of service via dtappgather program in CDE.
description: Teardrop IP denial of service.
description: Land IP denial of service.
description: FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce.
description: Buffer overflow in statd allows root privileges.
description: Delete or create a file via rpc.statd, due to invalid information.
description: Arbitrary command execution via buffer overflow in Count.cgi (wwwcount) cgi-bin program.
description: Local user gains root privileges via buffer overflow in rdist, via expstr() function.
description: Local user gains root privileges via buffer overflow in rdist, via lookup() function.
description: DNS cache poisoning via BIND, by predictable query IDs.
description: root privileges via buffer overflow in df command on SGI IRIX systems.
description: root privileges via buffer overflow in pset command on SGI IRIX systems.
description: root privileges via buffer overflow in eject command on SGI IRIX systems.
description: root privileges via buffer overflow in login/scheme command on SGI IRIX systems.
description: root privileges via buffer overflow in ordist command on SGI IRIX systems.
description: root privileges via buffer overflow in xlock command on SGI IRIX systems.
description: JavaScript in Internet Explorer 3.x and 4.x, and Netscape 2.x, 3.x and 4.x, allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability.
description: Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option.
description: Command execution in Sun systems via buffer overflow in the at program.
description: Buffer overflow in suidperl (sperl), Perl 4.x and 5.x.
description: Race condition in signal handling routine in ftpd, allowing read/write arbitrary files.
description: IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files.
description: Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail.
description: Buffer overflow in xlock program allows local users to execute commands as root.
description: webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter.
description: Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
description: Buffer overflow in NLS (Natural Language Service).
description: Buffer overflow in University of Washington's implementation of IMAP and POP servers.
description: Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
description: fsdump command in IRIX allows local users to obtain root access by modifying sensitive files.
description: List of arbitrary files on Web host via nph-test-cgi script.
description: Buffer overflow of rlogin program using TERM environmental variable.
description: MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4.
description: Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
description: Csetup under IRIX allows arbitrary file creation or overwriting.
description: Buffer overflow in HP-UX newgrp program.
description: Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX.
description: IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash.
description: TCP RST denial of service in FreeBSD.
description: Sun's ftpd daemon can be subjected to a denial of service.
description: Buffer overflows in Sun libnsl allow root access.
description: Buffer overflow in Sun's ping program can give root access to local users.
description: Vacation program allows command execution by remote users through a sendmail command.
description: Buffer overflow in PHP cgi program, php.cgi allows shell access.
description: IRIX fam service allows an attacker to obtain a list of all files on the server.
description: Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool.
description: File creation and deletion, and remote execution, in the BSD line printer daemon (lpd).
description: The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage.
description: Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port.
description: Buffer overflow in AIX lquerylv program gives root access to local users.
description: Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands.
description: AnyForm CGI remote execution.
description: phf CGI program allows remote command execution through shell metacharacters.
description: CGI PHP mylog script allows an attacker to read any file on the target server.
description: Solaris ufsrestore buffer overflow.
description: test-cgi program allows an attacker to list files on the server.
description: Apache httpd cookie buffer overflow for versions 1.1.1 and earlier.
description: Buffer overflow in AIX xdat gives root access to local users.
description: Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.
description: Listening TCP ports are sequentially allocated, allowing spoofing attacks.
description: PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password.
description: Buffer overflow in wu-ftp from PASV command causes a core dump.
description: Predictable TCP sequence numbers allow spoofing.
description: pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call.
description: Remote attackers can cause a denial of service in FTP by issuing multiple PASV commands, causing the server to run out of available ports.
description: Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command.
description: wu-ftp allows files to be overwritten via the rnfr command.
description: CWD ~root command in ftpd allows root access.
description: getcwd() file descriptor leak in FTP.
description: Certain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0.
description: Buffer overflow in rwhod on AIX and other operating systems allows remote attackers to execute arbitrary code via a UDP packet with a long hostname.
description: AIX routed allows remote users to modify sensitive files.
description: Denial of service in AIX telnet can freeze a system and prevent users from accessing the server.
description: IRIX and AIX automountd services (autofsd) allow remote users to execute root commands.
description: Buffer overflow in AIX libDtSvc library can allow local users to gain root access.
description: Buffer overflow in AIX rcp command allows local users to obtain root access.
description: Buffer overflow in AIX writesrv command allows local users to obtain root access.
description: Various vulnerabilities in the AIX portmir command allows local users to obtain root access.
description: AIX nslookup command allows local users to obtain root access by not dropping privileges correctly.
description: AIX piodmgrsu command allows local users to gain additional group privileges.
description: The debug command in Sendmail is enabled, allowing attackers to execute commands as root.
description: Sendmail decode alias can be used to overwrite sensitive files.
description: The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character).
description: Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activities.
description: Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.
description: Remote access in AIX innd 1.5.1, using control messages.