CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3747 | CVE-2001-0941 | Candidate | Buffer overflow in dbsnmp in Oracle 8.0.6 through 9.0.1 allows local users to execute arbitrary code via a long ORACLE_HOME environment variable. | Modified (20050702) | ACCEPT(4) Armstrong, Baker, Cole, Foat | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:oracle-dbsnmp-home-bo(7643) | View |
3748 | CVE-2001-0942 | Candidate | dbsnmp in Oracle 8.1.6 and 8.1.7 uses the ORACLE_HOME environment variable to find and execute the dbsnmp program, which allows local users to execute arbitrary programs by pointing the ORACLE_HOME to an alternate directory that contains a malicious version of dbsnmp. | Modified (20050702) | ACCEPT(2) Armstrong, Foat | MODIFY(1) Frech | NOOP(2) Cole, Wall | Frech> XF:oracle-dbsnmp-home-validation(7645) | View |
3749 | CVE-2001-0943 | Candidate | dbsnmp in Oracle 8.0.5 and 8.1.5, under certain conditions, trusts the PATH environment variable to find and execute the (1) chown or (2) chgrp commands, which allows local users to execute arbitrary code by modifying the PATH to point to Trojan Horse programs. | Modified (20050702) | ACCEPT(6) Armstrong, Baker, Cole, Foat, Green, Wall | MODIFY(1) Frech | Frech> XF:oracle-dbsnmp-path-gain-privileges(7644) | View |
3521 | CVE-2001-0713 | Candidate | Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function. | Modified (20050702) | ACCEPT(5) Armstrong, Baker, Cole, Foat, Wall | MODIFY(1) Frech | NOOP(1) Christey | Frech> XF:sendmail-setregid-gain-privileges(7192) | Christey> Consider adding BID:3377 | Christey> BID:3377 | URL:http://www.securityfocus.com/bid/3377 | View |
4610 | CVE-2002-0218 | Candidate | Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument. | Modified (20050703) | ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall | View |
Page 20436 of 20943, showing 5 records out of 104715 total, starting on record 102176, ending on 102180