CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4610 | CVE-2002-0218 | Candidate | Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument. | Modified (20050703) | ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall | View | |
4611 | CVE-2002-0219 | Candidate | Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument. | Modified (20050703) | ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall | View | |
4626 | CVE-2002-0234 | Candidate | NetScreen ScreenOS before 2.6.1 does not support a maximum number of concurrent sessions for a system, which allows an attacker on the trusted network to cause a denial of service (resource exhaustion) via a port scan to an external network, which consumes all available connections. | Proposed (20020502) | ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall | View | |
4628 | CVE-2002-0236 | Candidate | Lucent VitalSuite 8.0 through 8.2, including VitalNet, VitalEvent, and VitalHelp/VitalAnalysis, allows remote attackers to bypass authentication via a direct HTTP request to the VsSetCookie.exe program, which returns a valid cookie for the desired user. | Proposed (20020502) | ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall | View | |
4590 | CVE-2002-0198 | Candidate | Buffer overflow in plDaniels ripMime 1.2.6 and earlier, as used in other programs such as xamime and inflex, allows remote attackers to execute arbitrary code via an attachment in a long filename. | Proposed (20020502) | ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall | View |
Page 20103 of 20943, showing 5 records out of 104715 total, starting on record 100511, ending on 100515