CVE List

Id CVE No. Status Description Phase Votes Comments Actions
509  CVE-1999-0512  Candidate  A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.  Modified (20020427-01)  ACCEPT(3) Baker, Northcutt, Shostack | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:smtp-sendmail-relay(210) | XF:ntmail-relay(2257) | XF:exchange-relay(3107) (also assigned to CVE-1999-0682) | XF:smtp-relay-uucp(3470) | XF:sco-sendmail-spam(4342) | XF:sco-openserver-mmdf-spam(4343) | XF:lotus-domino-smtp-mail-relay(6591) | XF:win2k-smtp-mail-relay(6803) | XF:cobalt-poprelayd-mail-relay(6806) | | Candidate implicitly may refer to relaying settings enabled by default, or | the bypass/circumvention of relaying. Both interpretations were used in | assigning this candidate. | Christey> The intention of this candidate is to cover configurations in | which the admin has explicitly enabled relaying. Other cases | in which the application *intends* to prvent relaying, but | there is some specific input that bypasses/tricks it, count | as vulnerabilities (or exposures?) and as such would be | assigned different numbers. | | http://www.sendmail.org/~ca/email/spam.html seems like a good | general resource, as does ftp://ftp.isi.edu/in-notes/rfc2505.txt | Christey> I changed the description to make it more clear that the issue | is that of explicit configuration, as opposed to being the | result of a vulnerability.  View
3664  CVE-2001-0858  Candidate  Buffer overflow in pppattach and other linked PPP utilities in Caldera Open Unix 8.0 and UnixWare 7.1.0 and 7.1.1 allows local users to gain privileges.  Modified (20020817-01)  ACCEPT(5) Armstrong, Baker, Bishop, Cole, Foat | MODIFY(1) Frech | NOOP(1) Wall  Frech> XF:unixware-openunix-ppp-bo(7570)  View
4724  CVE-2002-0332  Candidate  Buffer overflows in xtell (xtelld) 1.91.1 and earlier, and 2.x before 2.7, allows remote attackers to execute arbitrary code via (1) a long DNS hostname that is determined using reverse DNS lookups, (2) a long AUTH string, or (3) certain data in the xtell request.  Modified (20020817-01)  ACCEPT(3) Baker, Cole, Frech | NOOP(4) Christey, Cox, Foat, Wall  Christey> DELREF XF:xtell-tty-directory-traversal(8313) | ADDREF XF:xtell-bo(8312)  View
4745  CVE-2002-0353  Candidate  The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields.  Modified (20020817-01)  ACCEPT(4) Armstrong, Cole, Cox, Green | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall  Christey> DEBIAN:DSA-130 | Christey> REDHAT:RHSA-2002:088 | URL:http://www.redhat.com/support/errata/RHSA-2002-088.html | BID:4604 | URL:http://www.securityfocus.com/bid/4604 | Christey> XF:ethereal-asn1-dos(8952) | URL:http://www.iss.net/security_center/static/8952.php | Frech> XF:ethereal-asn1-dos(8952) | Christey> CALDERA:CSSA-2002-037.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-037.0.txt | Christey> REDHAT:RHSA-2002:036 | URL:http://www.redhat.com/support/errata/RHSA-2002-036.html  View
4770  CVE-2002-0378  Candidate  The default configuration of LPRng print spooler in Red Hat Linux 7.0 through 7.3, Mandrake 8.1 and 8.2, and other operating systems, accepts print jobs from arbitrary remote hosts.  Modified (20020817-01)  ACCEPT(5) Baker, Cole, Cox, Foat, Wall | NOOP(1) Christey  Christey> Also affects HP. | XF:lprng-remote-jobs-dos(9322) | URL:http://www.iss.net/security_center/static/9322.php | BID:4980 | URL:http://www.securityfocus.com/bid/4980 | HP:HPSBTL0206-048 | URL:http://online.securityfocus.com/advisories/4205  View

Page 20396 of 20943, showing 5 records out of 104715 total, starting on record 101976, ending on 101980

Actions