CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3961  CVE-2001-1157  Candidate  Baltimore Technologies WEBsweeper 4.0 and 4.02 does not properly filter Javascript from HTML pages, which could allow remote attackers to bypass the filtering via (1) an extra leading < and one or more characters before the SCRIPT tag, or (2) tags using Unicode.  Proposed (20020315)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(5) Armstrong, Cole, Foat, Wall, Ziese  Frech> XF:content-script-bypass-filtering(6580) | XF:content-unicode-bypass-script(6980)  View
3963  CVE-2001-1159  Candidate  load_prefs.php and supporting include files in SquirrelMail 1.0.4 and earlier do not properly initialize certain PHP variables, which allows remote attackers to (1) view sensitive files via the config_php and data_dir options, and (2) execute arbitrary code by using options_order.php to upload a message that could be interpreted as PHP.  Proposed (20020315)  ACCEPT(3) Baker, Frech, Green | NOOP(5) Armstrong, Cole, Foat, Wall, Ziese  CHANGE> [Baker changed vote from REVIEWING to ACCEPT]  View
3967  CVE-2001-1163  Candidate  Buffer overflow in Munica Corporation NetSQL 1.0 allows remote attackers to execute arbitrary code via a long CONNECT argument to port 6500.  Proposed (20020315)  MODIFY(1) Frech | NOOP(6) Armstrong, Cole, Foat, Green, Wall, Ziese  CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:netsql-connect-bo(11231)  View
3968  CVE-2001-1164  Candidate  Buffer overflow in uucp utilities in UnixWare 7 allows local users to execute arbitrary code via long command line arguments to (1) uucp, (2) uux, (3) bnuconvert, (4) uucico, (5) uuxcmd, or (6) uuxqt.  Proposed (20020315)  ACCEPT(5) Armstrong, Baker, Cole, Green, Ziese | MODIFY(1) Frech | NOOP(2) Foat, Wall  Frech> XF:unixware-uucp-bo(6762) | XF:unixware-uucp-uux-bo(6763) | XF:unixware-uucp-bnuconvert-bo(6764) | XF:unixware-uucp-uucico-bo(6765) | XF:unixware-uucp-uuxcmd-bo(6766) | XF:unixware-uucp-uuxqt-bo(6767)  View
3969  CVE-2001-1165  Candidate  Intego FileGuard 4.0 uses weak encryption to store user information and passwords, which allows local users to gain privileges by decrypting the information, e.g., with the Disengage tool.  Proposed (20020315)  ACCEPT(1) Frech | NOOP(6) Armstrong, Cole, Foat, Green, Wall, Ziese    View

Page 163 of 20943, showing 5 records out of 104715 total, starting on record 811, ending on 815

Actions