CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3129 | CVE-2001-0308 | Candidate | UploadServlet in Bajie HTTP JServer 0.78, and possibly other versions before 0.80, allows remote attackers to execute arbitrary commands by calling the servlet to upload a program, then using a ... (modified ..) to access the file that was created for the program. | Modified (20080213) | MODIFY(1) Frech | NOOP(4) Bishop, Cole, Wall, Ziese | Frech> XF:bajie-directory-traversal(6115) | View |
5718 | CVE-2002-1334 | Candidate | Cross-site scripting (XSS) vulnerability in BizDesign ImageFolio 3.01 and earlier allows remote attackers to execute arbitrary web script as other users via (1) the direct parameter in imageFolio.cgi, or (2) nph-build.cgi. | Modified (20080226) | ACCEPT(1) Baker | NOOP(3) Cole, Cox, Wall | REVIEWING(1) Green | View | |
2291 | CVE-2000-0715 | Candidate | DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file. | Modified (20080226) | ACCEPT(3) Baker, Levy, Williams | MODIFY(2) Christey, Cox | NOOP(2) Cole, Wall | Christey> XF:diskcheck-tmp-race-condition | http://xforce.iss.net/static/5061.php | Christey> ADDREF REDHAT:RHSA-2000:122-04 ? | The advisory addresses some diskcheck symlink vulnerability, | but the initial announcement was 4 months before the advisory | was released; however, the DiskCheck versions seem to | correspond. | Christey> See various Bugtraq posts relating to this, and verify if the | Conectiva/Red Hat/etc. advisories are really addressing this | particular problem. | e.g.: BUGTRAQ:20000622 Re: rh 6.2 - gid compromises, etc [+ MORE!!!] | http://marc.theaimsgroup.com/?l=bugtraq&m=96172022819526&w=2 | BUGTRAQ:20000810 CONECTIVA LINUX SECURITY ANNOUNCEMENT - diskcheck | http://marc.theaimsgroup.com/?l=bugtraq&m=96604843017702&w=2 | REDHAT:RHSA-2000:122-06 | http://marc.theaimsgroup.com/?l=bugtraq&m=97649229201967&w=2 | BID:2050 | URL:http://www.securityfocus.com/bid/2050 | Christey> The following RedHat advisory appears to identify the same | problem as one that was posted to Bugtraq on August 8, 2000: | REDHAT:RHSA-2000:122-06 | http://www.redhat.com/support/errata/powertools/RHSA-2000-122.html | | See the following BugID, as referenced in the advisory: | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=11724 | So, add: | BID:2050 | URL:http://www.securityfocus.com/bid/2050 | XF:linux-diskcheck-race-symlink | URL:http://xforce.iss.net/static/5624.php | | [note the apparent BID duplicates, however] | CHANGE> [Christey changed vote from NOOP to MODIFY] | Christey> Missing BID - BID:1552 | Cox> ADDREF REDHAT:RHSA-2000:122 | View |
3348 | CVE-2001-0534 | Candidate | Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands. | Modified (20080304) | ACCEPT(2) Baker, Stracener | MODIFY(2) Christey, Frech | NOOP(5) Armstrong, Cole, Foat, Wall, Ziese | Frech> XF:merit-radius-authentication-bo(6812) | XF:lucent-radius-authentication-bo(6794) | Change ISS URL to http://xforce.iss.net/alerts/advise87.php | Christey> BID:2989 | BID:2991 | View |
5212 | CVE-2002-0822 | Candidate | Ethereal 0.9.4 and earlier allows remote attackers to cause a denial of service and possibly excecute arbitrary code via the (1) SOCKS, (2) RSVP, (3) AFS, or (4) LMP dissectors, which can be caused to core dump. | Modified (20080304) | ACCEPT(5) Baker, Cole, Cox, Foat, Green | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:ethereal-socks-dissector-dos(9493) | XF:ethereal-rsvp-dissector-dos(9494) | XF:ethereal-afs-dissector-dos(9495) | XF:ethereal-lmp-dissector-dos(9496) | Christey> REDHAT:RHSA-2002:036 | URL:http://www.redhat.com/support/errata/RHSA-2002-036.html | View |
Page 20493 of 20943, showing 5 records out of 104715 total, starting on record 102461, ending on 102465