CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3830 | CVE-2001-1026 | Candidate | Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address. | Modified (20050706) | ACCEPT(2) Cole, Frech | NOOP(4) Armstrong, Christey, Foat, Wall | REVIEWING(1) Green | Christey> Consider adding BID:2996 | Christey> Consider adding BID:2998 | Christey> Consider adding BID:2999 | Christey> Consider adding BID:3000 | Christey> fix typo: "leading a leading" | View |
69366 | CVE-2014-2071 | Candidate | ** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided. | Assigned (20140219) | None (candidate not yet proposed) | View | |
4086 | CVE-2001-1282 | Candidate | Ipswitch IMail 7.04 and earlier records the physical path of attachments in an e-mail message header, which could allow remote attackers to obtain potentially sensitive configuration information. | Proposed (20020502) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Cole, Cox, Foat, Wall | Frech> XF:imail-attachment-path-disclosure(7276) | View |
69622 | CVE-2014-2327 | Candidate | Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users. | Assigned (20140312) | None (candidate not yet proposed) | View | |
4342 | CVE-2001-1542 | Candidate | NAI WebShield SMTP 4.5 and possibly 4.5 MR1a does not filter improperly MIME encoded email attachments, which could allow remote attackers to bypass filtering and possibly execute arbitrary code in email clients that process the invalid attachments. | Assigned (20050714) | None (candidate not yet proposed) | View |
Page 19542 of 20943, showing 5 records out of 104715 total, starting on record 97706, ending on 97710