CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5765 | CVE-2002-1381 | Entry | Format string vulnerability in daemon.c for Exim 4.x through 4.10, and 3.x through 3.36, allows exim administrative users to execute arbitrary code by modifying the pid_file_path value. | View | |||
5764 | CVE-2002-1380 | Entry | Linux kernel 2.2.x allows local users to cause a denial of service (crash) by using the mmap() function with a PROT_READ parameter to access non-readable memory pages through the /proc/pid/mem interface. | View | |||
5763 | CVE-2002-1379 | Candidate | OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allows remote or local attackers to execute arbitrary code when libldap reads the .ldaprc file within applications that are running with extra privileges. | Proposed (20030317) | ACCEPT(2) Cole, Green | MODIFY(1) Cox | NOOP(1) Christey | Cox> Addref: RHSA-2002:312 | Christey> REDHAT:RHSA-2002:312 | View |
5762 | CVE-2002-1378 | Candidate | Multiple buffer overflows in OpenLDAP2 (OpenLDAP 2) 2.2.0 and earlier allow remote attackers to execute arbitrary code via (1) long -t or -r parameters to slurpd, (2) a malicious ldapfilter.conf file that is not properly handled by getfilter functions, (3) a malicious ldaptemplates.conf that causes an overflow in libldap, (4) a certain access control list that causes an overflow in slapd, or (5) a long generated filename for logging rejected replication requests. | Modified (20071017) | ACCEPT(2) Cole, Green | MODIFY(1) Cox | NOOP(1) Christey | Cox> Addref: REDHAT:RHSA-2002:312 | Christey> REDHAT:RHSA-2002:312 | View |
5761 | CVE-2002-1377 | Entry | vim 6.0 and 6.1, and possibly other versions, allows attackers to execute arbitrary commands using the libcall feature in modelines, which are not sandboxed but may be executed when vim is used to edit a malicious file, as demonstrated using mutt. | View |
Page 19791 of 20943, showing 5 records out of 104715 total, starting on record 98951, ending on 98955