CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
528 | CVE-1999-0531 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "An SMTP service supports EXPN, VRFY, HELP, ESMTP, and/or EHLO." | Modified (20080731) | MODIFY(1) Frech | NOOP(1) Christey | RECAST(1) Shostack | REJECT(1) Northcutt | Shostack> I think expn != vrfy, help, esmtp. | Frech> XF:lotus-domino-esmtp-bo(4499) (also assigned to CVE-2000-0452 and | CVE-2000-1046) | XF:smtp-expn(128) | XF:smtp-vrfy(130) | XF:smtp-helo-bo(886) | XF:smtp-vrfy-bo(887) | XF:smtp-expn-bo(888) | XF:slmail-vrfyexpn-overflow(1721) | XF:smtp-ehlo(323) | | Perhaps add RCPT? If so, add XF:smtp-rcpt(1928) | Christey> XF:smtp-vrfy(130) ? | View |
66064 | CVE-2013-6117 | Candidate | Dahua DVR 2.608.0000.0 and 2.608.GV00.0 allows remote attackers to bypass authentication and obtain sensitive information including user credentials, change user passwords, clear log files, and perform other actions via a request to TCP port 37777. | Assigned (20131012) | None (candidate not yet proposed) | View | |
66320 | CVE-2013-6373 | Candidate | The Exclusion plugin before 0.9 for Jenkins does not properly prevent access to resource locks, which allows remote authenticated users to list and release resources via unspecified vectors. | Assigned (20131104) | None (candidate not yet proposed) | View | |
1040 | CVE-1999-1060 | Candidate | Buffer overflow in Tetrix TetriNet daemon 1.13.16 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by connecting to port 31457 from a host with a long DNS hostname. | Proposed (20010912) | MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall | Frech> XF:tetrinet-dns-hostname-bo(7500) | View |
66576 | CVE-2013-6629 | Candidate | The get_sos function in jdmarker.c in (1) libjpeg 6b and (2) libjpeg-turbo through 1.3.0, as used in Google Chrome before 31.0.1650.48, Ghostscript, and other products, does not check for certain duplications of component data during the reading of segments that follow Start Of Scan (SOS) JPEG markers, which allows remote attackers to obtain sensitive information from uninitialized memory locations via a crafted JPEG image. | Assigned (20131105) | None (candidate not yet proposed) | View |
Page 1275 of 20943, showing 5 records out of 104715 total, starting on record 6371, ending on 6375