CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3651 | CVE-2001-0845 | Candidate | Vulnerability in DECwindows Motif Server on OpenVMS VAX or Alpha 6.2 through 7.3, and SEVMS VAX or Alpha 6.2, allows local users to gain access to unauthorized resources. | Modified (20020226-01) | ACCEPT(5) Armstrong, Baker, Bishop, Cole, Foat | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:openvms-dms-unauthorized-access(7425) | View |
1295 | CVE-1999-1315 | Candidate | Vulnerabilities in DECnet/OSI for OpenVMS before 5.8 on DEC Alpha AXP and VAX/VMS systems allow local users to gain privileges or cause a denial of service. | Proposed (20010912) | ACCEPT(4) Armstrong, Cole, Foat, Stracener | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:openvms-decnetosi-gain-privileges(7212) | View |
3952 | CVE-2001-1148 | Candidate | Multiple buffer overflows in programs used by scoadmin and sysadmsh in SCO OpenServer 5.0.6a and earlier allow local users to gain privileges via a long TERM environment variable to (1) atcronsh, (2) auditsh, (3) authsh, (4) backupsh, (5) lpsh, (6) sysadm.menu, or (7) termsh. | Modified (20050707) | ACCEPT(4) Armstrong, Baker, Cole, Green | MODIFY(1) Frech | NOOP(3) Foat, Wall, Ziese | Frech> XF:openserver-scoadmin-sysadm-bo(7281) | View |
3199 | CVE-2001-0381 | Candidate | The OpenPGP PGP standard allows an attacker to determine the private signature key via a cryptanalytic attack in which the attacker alters the encrypted private key file and captures a single message signed with the signature key. | Modified (20060915) | ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(4) Christey, Cole, Oliver, Wall | REVIEWING(1) Ziese | Frech> XF:openpgp-private-key-disclosure(6558) | Christey> Consider CALDERA:CSSA-2001-017.0 | URL:http://www.caldera.com/support/security/advisories/CSSA-2001-017.0.txt | Also http://www.redhat.com/support/errata/RHSA-2001-063.html | Add that gnupg before 1.0.5-3 is affected. | TURBO:TLSA2001028 | http://www.turbolinux.com/pipermail/tl-security-announce/2001-June/000439.html | View |
2850 | CVE-2001-0029 | Candidate | Buffer overflow in oops WWW proxy server 1.4.6 (and possibly other versions) allows remote attackers to execute arbitrary commands via a long host or domain name that is obtained from a reverse DNS lookup. | Modified (20020222-01) | ACCEPT(2) Baker, Cole | MODIFY(1) Frech | NOOP(3) Christey, Wall, Ziese | Frech> XF:oops-dns-bo(6122) | Christey> This looks like a different overflow than the one described | in the original post at: | http://archives.neohapsis.com/archives/bugtraq/2000-12/0127.html | The vendor does acknowledge *that* problem in the 1.5.0 | comments of | http://zipper.paco.net/~igor/oops/ChangeLog | Christey> Vendor fixed this problem between 1.4.22 and 1.5.5, based | on a source code comparison. | CD:SF-LOC says that bugs of the same type, that appear in | different versions, must be SPLIT. Therefore this should | stay separate from CVE-2001-0028. | | Change MISC to CONFIRM. The comments for version 1.5.4 | say "more sprintf/strncpy fixes" and that"s the type of | changes that were made in lib.c, the code that was listed | in the Bugtraq post for this CAN. | View |
Page 118 of 20943, showing 5 records out of 104715 total, starting on record 586, ending on 590