CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1874  CVE-2000-0296  Entry  fcheck allows local users to gain privileges by embedding shell metacharacters into file names that are processed by fcheck.        View
2130  CVE-2000-0553  Entry  Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions.        View
2386  CVE-2000-0810  Entry  Auction Weaver 1.0 through 1.04 does not properly validate the names of form fields, which allows remote attackers to delete arbitrary files and directories via a .. (dot dot) attack.        View
2642  CVE-2000-1074  Entry  csstart program in iCal 2.1 Patch 2 uses relative pathnames to install the libsocket and libnsl libraries, which could allow the icsuser account to gain root privileges by creating a Trojan Horse library in the current or parent directory.        View
2898  CVE-2001-0077  Entry  The clustmon service in Sun Cluster 2.x does not require authentication, which allows remote attackers to obtain sensitive information such as system logs and cluster configurations.        View

Page 198 of 20943, showing 5 records out of 104715 total, starting on record 986, ending on 990

Actions