CVE List

Id CVE No. Status Description Phase Votes Comments Actions
5083  CVE-2002-0693  Candidate  Buffer overflow in the HTML Help ActiveX Control (hhctrl.ocx) in Microsoft Windows 98, 98 Second Edition, Millennium Edition, NT 4.0, NT 4.0 Terminal Server Edition, Windows 2000, and Windows XP allows remote attackers to execute code via (1) a long parameter to the Alink function, or (2) script containing a long argument to the showHelp function.  Modified (20061101)  ACCEPT(3) Cole, Green, Wall | NOOP(1) Cox    View
4746  CVE-2002-0354  Candidate  The XMLHttpRequest object (XMLHTTP) in Netscape 6.1 and Mozilla 0.9.7 allows remote attackers to read arbitrary files and list directories on a client system by opening a URL that redirects the browser to the file on the client, then reading the result using the responseText property.  Proposed (20020502)  ACCEPT(3) Cole, Green, Wall | MODIFY(2) Cox, Frech | NOOP(3) Armstrong, Christey, Foat  CHANGE> [Cox changed vote from ACCEPT to MODIFY] | Cox> Mozilla 0.9.9 is also vulnerable | ADDREF: http://bugzilla.mozilla.org/show_bug.cgi?id=141061 | Christey> REDHAT:RHSA-2002:079 | Christey> BUGTRAQ:20020502 Fix for Mozilla XMLHttpRequest file disclosure vulnerability | URL:http://archives.neohapsis.com/archives/bugtraq/2002-05/0016.html | REDHAT:RHSA-2002:079 | URL:http://www.redhat.com/support/errata/RHSA-2002-079.html | CONECTIVA:CLA-2002:490 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000490 | BID:4628 | URL:http://www.securityfocus.com/bid/4628 | BUGTRAQ:20020504 UPDATE (1-May-2002): Reading local files in Netscape 6 and Mozilla (GM#001-NS) | URL:http://online.securityfocus.com/archive/1/270948 | Christey> XF:mozilla-netscape-xmlhttprequest-redirect(8963) | URL:http://www.iss.net/security_center/static/8963.php | Frech> XF:mozilla-netscape-xmlhttprequest-redirect(8963)  View
4431  CVE-2002-0037  Candidate  Lotus Domino Servers 5.x, 4.6x, and 4.5x allows attackers to bypass the intended Reader and Author access list for a document"s object via a Notes API call (NSFDbReadObject) that directly accesses the object.  Modified (20050528)  ACCEPT(3) Cole, Green, Wall | MODIFY(1) Frech | NOOP(4) Armstrong, Christey, Cox, Foat  Christey> Need to find some references for these... probably in | the CERT/CC vulnerability notes. | Frech> XF:lotus-domino-nsfdbreadobject(10095) | http://www.kb.cert.org/vuls/id/657899 | CONFIRM: | http://www-1.ibm.com/support/docview.wss?rs=1&org=sims&doc=CCA46CF459B | A6E4A85256AE3007C92C1 | Christey> Is this the same issue here? | BUGTRAQ:20011217 Lotus Notes: File attachments may be extracted regardless of document security | URL:http://archives.neohapsis.com/archives/bugtraq/2001-09/0147.html  View
4032  CVE-2001-1228  Candidate  Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server.  Modified (20020817-01)  ACCEPT(3) Cole, Green, Wall | MODIFY(1) Frech | NOOP(3) Christey, Cox, Foat  Christey> NETBSD:NetBSD-SA2002-002 | URL:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc | Frech> XF:gzip-long-filename-bo(7882)  View
4110  CVE-2001-1306  Candidate  iPlanet Directory Server 4.1.4 and earlier (LDAP) allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via invalid BER length of length fields, as demonstrated by the PROTOS LDAPv3 test suite.  Proposed (20020502)  ACCEPT(3) Cole, Green, Wall | MODIFY(1) Frech | NOOP(2) Cox, Foat  Frech> XF:iplanet-ldap-protos-bo(6893)  View

Page 19964 of 20943, showing 5 records out of 104715 total, starting on record 99816, ending on 99820

Actions