CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
2554 | CVE-2000-0985 | Candidate | Buffer overflow in All-Mail 1.1 allows remote attackers to execute arbitrary commands via a long "MAIL FROM" or "RCPT TO" command. | Proposed (20001129) | ACCEPT(2) Baker, Mell | MODIFY(1) Frech | NOOP(1) Cole | Frech> XF:all-mail-smtp-bo(5360) | View |
2555 | CVE-2000-0986 | Candidate | Buffer overflow in Oracle 8.1.5 applications such as names, namesctl, onrsd, osslogin, tnslsnr, tnsping, trcasst, and trcroute possibly allow local users to gain privileges via a long ORACLE_HOME environmental variable. | Proposed (20001129) | ACCEPT(3) Baker, Frech, Mell | NOOP(2) Armstrong, Cole | View | |
2556 | CVE-2000-0987 | Candidate | Buffer overflow in oidldapd in Oracle 8.1.6 allow local users to gain privileges via a long "connect" command line parameter. | Proposed (20001129) | ACCEPT(3) Cole, Frech, Mell | NOOP(2) Armstrong, Christey | Christey> http://archives.neohapsis.com/archives/bugtraq/2000-12/0400.html | appears to be a rediscovery of this problem. | Christey> It looks like Juan Manuel Pascual Escriba saw this issue | in a later version and re-posted, but that later post doesn"t | mention the earlier one. The exploit is almost exactly the | same, but the affected version is 8.1.7. | ADDREF BUGTRAQ:20001221 vulnerability #1 in Oracle Internet Directory 2.1.1.1 in Oracle 8.1.7 | http://archives.neohapsis.com/archives/bugtraq/2000-12/0400.html | ADDREF BUGTRAQ:20010118 Patch for Potential Buffer Overflow Vulnerabilities in Oracle Internet Directory | http://archives.neohapsis.com/archives/bugtraq/2001-01/0325.html | View |
2557 | CVE-2000-0988 | Candidate | WinU 1.0 through 5.1 has a backdoor password that allows remote attackers to gain access to its administrative interface and modify configuration. | Proposed (20001129) | ACCEPT(4) Armstrong, Cole, Frech, Mell | View | |
2608 | CVE-2000-1039 | Candidate | Various TCP/IP stacks and network applications allow remote attackers to cause a denial of service by flooding a target host with TCP connection attempts and completing the TCP/IP handshake without maintaining the connection state on the attacker host, aka the "NAPTHA" class of vulnerabilities. NOTE: this candidate may change significantly as the security community discusses the technical nature of NAPTHA and learns more about the affected applications. This candidate is at a higher level of abstraction than is typical for CVE. | Proposed (20001219) | ACCEPT(3) Baker, Cole, Renaud | MODIFY(1) Frech | NOOP(2) Magdych, Wall | REVIEWING(1) Christey | Baker> Although this is at a high level, the fact is that it is a vulnerability, and as such we need to recognize this, even if we have to recast or modify the description at some later time. | Christey> This needs to be commented on and reviewed by many Board | members. | Frech> XF:naptha-resource-starvation(5810) | Christey> ADDREF SGI:20020304-01-A | Christey> SGI:20020304-01-A | View |
Page 20612 of 20943, showing 5 records out of 104715 total, starting on record 103056, ending on 103060