CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3265  CVE-2001-0448  Candidate  Web configuration server in 602Pro LAN SUITE allows remote attackers to cause a denial of service via an HTTP GET HTTP request to the aux directory, and possibly other directories with legacy DOS device names.  Proposed (20010524)  MODIFY(1) Frech | NOOP(4) Christey, Cole, Wall, Ziese  Frech> XF:software602-lan-suite-bo(5583) | Christey> This should be BID:2514 (and CVE-2001-0447 should have | BID:2514 removed from its set of references)  View
3281  CVE-2001-0464  Candidate  Buffer overflow in websync.exe in Cyberscheduler allows remote attackers to execute arbitrary commands via a long tzs (timezone) parameter.  Modified (20070307)  MODIFY(1) Frech | NOOP(4) Christey, Cole, Wall, Ziese  Frech> XF:cyberscheduler-timezone-bo(6401) | Christey> BUGTRAQ:20010420 Apology: Advisory numbering confusion | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=98779423227844&w=2  View
2295  CVE-2000-0719  Candidate  VariCAD 7.0 is installed with world-writeable files, which allows local users to replace the VariCAD programs with a Trojan horse program.  Proposed (20000921)  MODIFY(1) Frech | NOOP(4) Christey, Cole, Wall, Williams | REVIEWING(1) Levy  Christey> XF:varicad-world-write-permissions | http://xforce.iss.net/static/5077.php | Frech> XF:aricad-world-write-permissions(5077) | Christey> BID:1862  View
3032  CVE-2001-0211  Candidate  Directory traversal vulnerability in WebSPIRS 3.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack on the sp.nextform parameter.  Proposed (20010309)  MODIFY(1) Frech | NOOP(4) Christey, Cole, Lawler, Ziese  Frech> XF:webspirs-cgi-view-files(6101) | Christey> ADDREF BUGTRAQ:20010331 Webspirs remote script explotation | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=98608561912120&w=2 | Christey> Mention the webspirs.cgi program specifically; also, should | the version be 3.3.1?  View
1046  CVE-1999-1066  Candidate  Quake 1 server responds to an initial UDP game connection request with a large amount of traffic, which allows remote attackers to use the server as an amplifier in a "Smurf" style attack on another host, by spoofing the connection request.  Proposed (20010912)  MODIFY(1) Frech | NOOP(4) Christey, Cole, Foat, Wall  Christey> This is apparently a problem with the connection protocol. | See BUGTRAQ:19980522 NetQuake Protocol problem resulting in smurf like effect. | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90221101925989&w=2 | Frech> XF:quake-udp-connection-dos(7862)  View

Page 19805 of 20943, showing 5 records out of 104715 total, starting on record 99021, ending on 99025

Actions