CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
8434 | CVE-2004-0006 | Candidate | Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect. | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Cox> Although the 0.59.1 version of Gaim shipped by Red Hat contained these | flaws, Yahoo connections were not functional and therefore the majority of | the issues could not be exploited, leading to the abstraction comment above. | Christey> CERT-VN:VU#871838 | URL:http://www.kb.cert.org/vuls/id/871838 | CERT-VN:VU#444158 | URL:http://www.kb.cert.org/vuls/id/444158 | CERT-VN:VU#503030 | URL:http://www.kb.cert.org/vuls/id/503030 | CERT-VN:VU#371382 | URL:http://www.kb.cert.org/vuls/id/371382 | CERT-VN:VU#297198 | URL:http://www.kb.cert.org/vuls/id/297198 | CERT-VN:VU#527142 | URL:http://www.kb.cert.org/vuls/id/527142 | Christey> Normalize Gentoo reference | View |
8435 | CVE-2004-0007 | Candidate | Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code. | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Christey> Normalize Gentoo, Slackware reference | Christey> CERT-VN:VU#197142 | View |
8436 | CVE-2004-0008 | Candidate | Integer overflow in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a directIM packet that triggers a heap-based buffer overflow. | Modified (20100819) | ACCEPT(6) Armstrong, Baker, Cole, Cox, Green, Wall | NOOP(1) Christey | Christey> CERT-VN:VU#779614 | View |
7421 | CVE-2003-0594 | Candidate | Mozilla allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Mozilla to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application. | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Balinsky, Cole, Cox | MODIFY(1) Frech | NOOP(1) Wall | REVIEWING(1) Christey | Christey> REDHAT:RHSA-2004:112 | URL:http://www.redhat.com/support/errata/RHSA-2004-112.html | Frech> XF:web-browser-cookie-bypass(15424) | http://xforce.iss.net/xforce/xfdb/15424 | Cox> Addref: REDHAT:RHSA-2004:112 | Christey> REDHAT:RHSA-2004:110 | URL:http://www.redhat.com/support/errata/RHSA-2004-110.html | Balinsky> Link in References. | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Consider whether this is really a design-level problem that applies to | the interaction between any vulnerable XSS, its associated domain, and | any web browser, because browsers enforce security boundaries at the | domain level. If so, then the "%2e%2e" problem may be a red herring, | or a single attack vector of any number of vectors. | | CVE-2003-0513, CVE-2003-0514, CVE-2003-0592, CVE-2003-0593, | and CVE-2003-0594 all cover this specific issue (each for a | different browser). | Christey> HP:SSRT4722 | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=108448379429944&w=2 | Christey> FEDORA:FLSA:2089 | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=109900315219363&w=2 | View |
4811 | CVE-2002-0419 | Candidate | Information leaks in IIS 4 through 5.1 allow remote attackers to obtain potentially sensitive information or more easily conduct brute force attacks via responses from the server in which (2) in certain configurations, the server IP address is provided as the realm for Basic authentication, which could reveal real IP addresses that were obscured by NAT, or (3) when NTLM authentication is used, the NetBIOS name of the server and its Windows NT domain are revealed in response to an Authorization request. NOTE: this entry originally contained a vector (1) in which the server reveals whether it supports Basic or NTLM authentication through 401 Access Denied error messages. CVE has REJECTED this vector; it is not a vulnerability because the information is already available through legitimate use, since authentication cannot proceed without specifying a scheme that is supported by both the client and the server. | Modified (20110304) | ACCEPT(2) Alderson, Frech | NOOP(3) Cole, Cox, Foat | REVIEWING(1) Wall | View |
Page 20514 of 20943, showing 5 records out of 104715 total, starting on record 102566, ending on 102570