CVE List

Id CVE No. Status Description Phase Votes Comments Actions
2554  CVE-2000-0985  Candidate  Buffer overflow in All-Mail 1.1 allows remote attackers to execute arbitrary commands via a long "MAIL FROM" or "RCPT TO" command.  Proposed (20001129)  ACCEPT(2) Baker, Mell | MODIFY(1) Frech | NOOP(1) Cole  Frech> XF:all-mail-smtp-bo(5360)  View
2555  CVE-2000-0986  Candidate  Buffer overflow in Oracle 8.1.5 applications such as names, namesctl, onrsd, osslogin, tnslsnr, tnsping, trcasst, and trcroute possibly allow local users to gain privileges via a long ORACLE_HOME environmental variable.  Proposed (20001129)  ACCEPT(3) Baker, Frech, Mell | NOOP(2) Armstrong, Cole    View
2556  CVE-2000-0987  Candidate  Buffer overflow in oidldapd in Oracle 8.1.6 allow local users to gain privileges via a long "connect" command line parameter.  Proposed (20001129)  ACCEPT(3) Cole, Frech, Mell | NOOP(2) Armstrong, Christey  Christey> http://archives.neohapsis.com/archives/bugtraq/2000-12/0400.html | appears to be a rediscovery of this problem. | Christey> It looks like Juan Manuel Pascual Escriba saw this issue | in a later version and re-posted, but that later post doesn"t | mention the earlier one. The exploit is almost exactly the | same, but the affected version is 8.1.7. | ADDREF BUGTRAQ:20001221 vulnerability #1 in Oracle Internet Directory 2.1.1.1 in Oracle 8.1.7 | http://archives.neohapsis.com/archives/bugtraq/2000-12/0400.html | ADDREF BUGTRAQ:20010118 Patch for Potential Buffer Overflow Vulnerabilities in Oracle Internet Directory | http://archives.neohapsis.com/archives/bugtraq/2001-01/0325.html  View
2557  CVE-2000-0988  Candidate  WinU 1.0 through 5.1 has a backdoor password that allows remote attackers to gain access to its administrative interface and modify configuration.  Proposed (20001129)  ACCEPT(4) Armstrong, Cole, Frech, Mell    View
2608  CVE-2000-1039  Candidate  Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE.  Proposed (20001219)  ACCEPT(3) Baker, Cole, Renaud | MODIFY(1) Frech | NOOP(2) Magdych, Wall | REVIEWING(1) Christey  Baker> Although this is at a high level, the fact is that it is a vulnerability, and as such we need to recognize this, even if we have to recast or modify the description at some later time. | Christey> This needs to be commented on and reviewed by many Board | members. | Frech> XF:naptha-resource-starvation(5810) | Christey> ADDREF SGI:20020304-01-A | Christey> SGI:20020304-01-A  View

Page 20612 of 20943, showing 5 records out of 104715 total, starting on record 103056, ending on 103060

Actions