CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5201 | CVE-2002-0811 | Candidate | Bugzilla 2.14 before 2.14.2, and 2.16 before 2.16rc2, may allow remote attackers to cause a denial of service or execute certain queries via a SQL injection attack on the sort order parameter to buglist.cgi. | Proposed (20020830) | ACCEPT(3) Baker, Cole, Wall | MODIFY(1) Frech | NOOP(1) Foat | Frech> XF:bugzilla-buglist-sql-injection(10144) | View |
5202 | CVE-2002-0812 | Candidate | Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string. | Modified (20040725) | ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall | Christey> VULNWATCH:20020813 Foundstone Labs Advisory - Information Leakage in Orinoco and Compaq Access Points [updated] | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0075.html | XF:orinoco-rg-default-snmp(9810) | URL:http://www.iss.net/security_center/static/9810.php | BID:5436 | URL:http://www.securityfocus.com/bid/5436 | Frech> XF:orinoco-rg-default-snmp(9810) | View |
5203 | CVE-2002-0813 | Entry | Heap-based buffer overflow in the TFTP server capability in Cisco IOS 11.1, 11.2, and 11.3 allows remote attackers to cause a denial of service (reset) or modify configuration via a long filename. | View | |||
5204 | CVE-2002-0814 | Entry | Buffer overflow in VMware Authorization Service for VMware GSX Server 2.0.0 build-2050 allows remote authenticated users to execute arbitrary code via a long GLOBAL argument. | View | |||
5205 | CVE-2002-0815 | Candidate | The Javascript "Same Origin Policy" (SOP), as implemented in (1) Netscape, (2) Mozilla, and (3) Internet Explorer, allows a remote web server to access HTTP and SOAP/XML content from restricted sites by mapping the malicious server"s parent DNS domain name to the restricted site, loading a page from the restricted site into one frame, and passing the information to the attacker-controlled frame, which is allowed because the document.domain of the two frames matches on the parent domain. | Proposed (20020830) | ACCEPT(1) Baker | NOOP(4) Cole, Cox, Foat, Wall | View |
Page 1041 of 20943, showing 5 records out of 104715 total, starting on record 5201, ending on 5205