CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4620  CVE-2002-0228  Candidate  Microsoft MSN Messenger allows remote attackers to use Javascript that references an ActiveX object to obtain sensitive information such as display names and web site navigation, and possibly more when the user is connected to certain Microsoft sites (or DNS-spoofed sites).  Proposed (20020502)  ACCEPT(2) Cole, Green | NOOP(1) Foat | REVIEWING(1) Wall    View
4109  CVE-2001-1305  Candidate  ICQ 2001a Alpha and earlier allows remote attackers to automatically add arbitrary UINs to an ICQ user"s contact list via a URL to a web page with a Content-Type of application/x-icq, which is processed by Internet Explorer.  Proposed (20020502)  ACCEPT(2) Frech, Green | NOOP(4) Cole, Cox, Foat, Wall    View
4621  CVE-2002-0229  Candidate  Safe Mode feature (safe_mode) in PHP 3.0 through 4.1.0 allows attackers with access to the MySQL database to bypass Safe Mode access restrictions and read arbitrary files using "LOAD DATA INFILE LOCAL" SQL statements.  Proposed (20020502)  ACCEPT(1) Green | NOOP(3) Cole, Foat, Wall    View
4110  CVE-2001-1306  Candidate  iPlanet Directory Server 4.1.4 and earlier (LDAP) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via invalid BER length of length fields, as demonstrated by the PROTOS LDAPv3 test suite.  Proposed (20020502)  ACCEPT(3) Cole, Green, Wall | MODIFY(1) Frech | NOOP(2) Cox, Foat  Frech> XF:iplanet-ldap-protos-bo(6893)  View
4622  CVE-2002-0230  Candidate  Cross-site scripting vulnerability in fom.cgi of Faq-O-Matic 2.712 allows remote attackers to execute arbitrary Javascript on other clients via the cmd parameter, which causes the script to be inserted into an error message.  Proposed (20020502)  ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall | RECAST(1) Christey  Christey> XF:faqomatic-cgi-css(8066) | URL:http://www.iss.net/security_center/static/8066.php | BID:4023 | URL:http://www.securityfocus.com/bid/4023 | | A similar issue was discovered a few months afterward in the | "file" parameter, but it was already fixed by the vendor along | with the cmd parameter. Thus CD:SF-LOC suggests combining | these into a single item. | CONFIRM:http://sourceforge.net/mailarchive/forum.php?thread_id=477665&forum_id=6367 | BID:4565 | URL:http://www.securityfocus.com/bid/4565  View

Page 120 of 20943, showing 5 records out of 104715 total, starting on record 596, ending on 600

Actions