CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3747  CVE-2001-0941  Candidate  Buffer overflow in dbsnmp in Oracle 8.0.6 through 9.0.1 allows local users to execute arbitrary code via a long ORACLE_HOME environment variable.  Modified (20050702)  ACCEPT(4) Armstrong, Baker, Cole, Foat | MODIFY(1) Frech | NOOP(1) Wall  Frech> XF:oracle-dbsnmp-home-bo(7643)  View
3748  CVE-2001-0942  Candidate  dbsnmp in Oracle 8.1.6 and 8.1.7 uses the ORACLE_HOME environment variable to find and execute the dbsnmp program, which allows local users to execute arbitrary programs by pointing the ORACLE_HOME to an alternate directory that contains a malicious version of dbsnmp.  Modified (20050702)  ACCEPT(2) Armstrong, Foat | MODIFY(1) Frech | NOOP(2) Cole, Wall  Frech> XF:oracle-dbsnmp-home-validation(7645)  View
3749  CVE-2001-0943  Candidate  dbsnmp in Oracle 8.0.5 and 8.1.5, under certain conditions, trusts the PATH environment variable to find and execute the (1) chown or (2) chgrp commands, which allows local users to execute arbitrary code by modifying the PATH to point to Trojan Horse programs.  Modified (20050702)  ACCEPT(6) Armstrong, Baker, Cole, Foat, Green, Wall | MODIFY(1) Frech  Frech> XF:oracle-dbsnmp-path-gain-privileges(7644)  View
3521  CVE-2001-0713  Candidate  Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function.  Modified (20050702)  ACCEPT(5) Armstrong, Baker, Cole, Foat, Wall | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:sendmail-setregid-gain-privileges(7192) | Christey> Consider adding BID:3377 | Christey> BID:3377 | URL:http://www.securityfocus.com/bid/3377  View
4610  CVE-2002-0218  Candidate  Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument.  Modified (20050703)  ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall    View

Page 20436 of 20943, showing 5 records out of 104715 total, starting on record 102176, ending on 102180

Actions