CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
8433 | CVE-2004-0005 | Candidate | Multiple buffer overflows in Gaim 0.75 allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) octal encoding in yahoo_decode that causes a null byte to be written beyond the buffer, (2) octal encoding in yahoo_decode that causes a pointer to reference memory beyond the terminating null byte, (3) a quoted printable string to the gaim_quotedp_decode MIME decoder that causes a null byte to be written beyond the buffer, and (4) quoted printable encoding in gaim_quotedp_decode that causes a pointer to reference memory beyond the terminating null byte. | Modified (20071113) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Christey> CERT-VN:VU#404470 | URL:http://www.kb.cert.org/vuls/id/404470 | CERT-VN:VU#655974 | URL:http://www.kb.cert.org/vuls/id/655974 | CERT-VN:VU#226974 | URL:http://www.kb.cert.org/vuls/id/226974 | CERT-VN:VU#190366 | URL:http://www.kb.cert.org/vuls/id/190366 | View |
8434 | CVE-2004-0006 | Candidate | Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect. | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Cox> Although the 0.59.1 version of Gaim shipped by Red Hat contained these | flaws, Yahoo connections were not functional and therefore the majority of | the issues could not be exploited, leading to the abstraction comment above. | Christey> CERT-VN:VU#871838 | URL:http://www.kb.cert.org/vuls/id/871838 | CERT-VN:VU#444158 | URL:http://www.kb.cert.org/vuls/id/444158 | CERT-VN:VU#503030 | URL:http://www.kb.cert.org/vuls/id/503030 | CERT-VN:VU#371382 | URL:http://www.kb.cert.org/vuls/id/371382 | CERT-VN:VU#297198 | URL:http://www.kb.cert.org/vuls/id/297198 | CERT-VN:VU#527142 | URL:http://www.kb.cert.org/vuls/id/527142 | Christey> Normalize Gentoo reference | View |
8435 | CVE-2004-0007 | Candidate | Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code. | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Christey> Normalize Gentoo, Slackware reference | Christey> CERT-VN:VU#197142 | View |
2771 | CVE-2000-1204 | Candidate | Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root. | Proposed (20020830) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | MODIFY(1) Frech | NOOP(2) Foat, Wall | Frech> XF:apache-modvhostalias-source-disclosure(11088) | View |
5107 | CVE-2002-0717 | Candidate | PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed. | Proposed (20020726) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Frech | NOOP(2) Christey, Foat | REVIEWING(1) Wall | Christey> BID:5278 | URL:http://www.securityfocus.com/bid/5278 | HP:HPSBUX0208-207 | URL:http://online.securityfocus.com/advisories/4362 | View |
Page 19889 of 20943, showing 5 records out of 104715 total, starting on record 99441, ending on 99445