CVE List

Id CVE No. Status Description Phase Votes Comments Actions
5107  CVE-2002-0717  Candidate  PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed.  Proposed (20020726)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Frech | NOOP(2) Christey, Foat | REVIEWING(1) Wall  Christey> BID:5278 | URL:http://www.securityfocus.com/bid/5278 | HP:HPSBUX0208-207 | URL:http://online.securityfocus.com/advisories/4362  View
2771  CVE-2000-1204  Candidate  Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.  Proposed (20020830)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | MODIFY(1) Frech | NOOP(2) Foat, Wall  Frech> XF:apache-modvhostalias-source-disclosure(11088)  View
8431  CVE-2004-0003  Candidate  Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."  Modified (20100819)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Christey> DEBIAN:DSA-479 | URL:http://www.debian.org/security/2004/dsa-479 | DEBIAN:DSA-480 | URL:http://www.debian.org/security/2004/dsa-480 | DEBIAN:DSA-481 | URL:http://www.debian.org/security/2004/dsa-481 | DEBIAN:DSA-482 | URL:http://www.debian.org/security/2004/dsa-482 | Christey> DEBIAN:DSA-489 | URL:http://www.debian.org/security/2004/dsa-489 | DEBIAN:DSA-491 | URL:http://www.debian.org/security/2004/dsa-491 | Christey> DEBIAN:DSA-495 | URL:http://www.debian.org/security/2004/dsa-495 | REDHAT:RHSA-2004:166 | URL:http://rhn.redhat.com/errata/RHSA-2004-166.html | Christey> REDHAT:RHSA-2004:188 | URL:http://www.redhat.com/support/errata/RHSA-2004-188.html | Christey> CONECTIVA:CLA-2004:846 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846  View
8433  CVE-2004-0005  Candidate  Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte.  Modified (20071113)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Christey> CERT-VN:VU#404470 | URL:http://www.kb.cert.org/vuls/id/404470 | CERT-VN:VU#655974 | URL:http://www.kb.cert.org/vuls/id/655974 | CERT-VN:VU#226974 | URL:http://www.kb.cert.org/vuls/id/226974 | CERT-VN:VU#190366 | URL:http://www.kb.cert.org/vuls/id/190366  View
8434  CVE-2004-0006  Candidate  Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.  Modified (20100819)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Cox> Although the 0.59.1 version of Gaim shipped by Red Hat contained these | flaws, Yahoo connections were not functional and therefore the majority of | the issues could not be exploited, leading to the abstraction comment above. | Christey> CERT-VN:VU#871838 | URL:http://www.kb.cert.org/vuls/id/871838 | CERT-VN:VU#444158 | URL:http://www.kb.cert.org/vuls/id/444158 | CERT-VN:VU#503030 | URL:http://www.kb.cert.org/vuls/id/503030 | CERT-VN:VU#371382 | URL:http://www.kb.cert.org/vuls/id/371382 | CERT-VN:VU#297198 | URL:http://www.kb.cert.org/vuls/id/297198 | CERT-VN:VU#527142 | URL:http://www.kb.cert.org/vuls/id/527142 | Christey> Normalize Gentoo reference  View

Page 1055 of 20943, showing 5 records out of 104715 total, starting on record 5271, ending on 5275

Actions