Database Of Vulnerabilities, Exploits, and Signatures
This is the home for the public part of DOVES.
UNIX Vulnerabilities
- fingerd(8) Daemon Buffer Overflow
- mkdir(1) Race Condition
- loadmodule(1) Environment Variable Problem
- modload(1) Environment Variable Problem
- expreserve(1) IFS
Environment Variable Problem
- expreserve(1) PATH
Environment Variable Problem
- rdist(1) IFS
Environment Variable Problem
- rdist(1) PATH
Environment Variable Problem
- xterm(1) Race Condition
- Audio Eavesdropping
Burroughs B6700 Vulnerabilities
- Failure to Check Integrity of Program Labels
IBM KVM 360 Vulnerabilities
- Communications Channel Between Virtual Machines
Network Protocol and Implementation Vulnerabilities
- Same Source and Destination Addresses
- Maximum Size ICMP ECHO Packets
If you want to add something to this database,
please download a copy of the Vulnerability Template File
(below) and fill it out. The file contains instructions on how to
do this. Then email it to us at
bishop@cs.ucdavis.edu and indicate any restrictions on dissemination.
We'll assign it a number and put your file into the database.
If we edit it for consistency or because we have additional information,
we'll send you a copy for approval before we put it
into the database.
We ask you to mail it to us for two reasons:
- So we can assign it a unique number in the DOVES scheme
- So we can make a consistency check against other vulnerabilities