CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5767 | CVE-2002-1383 | Candidate | Multiple integer overflows in Common Unix Printing System (CUPS) 1.1.14 through 1.1.17 allow remote attackers to execute arbitrary code via (1) the CUPSd HTTP interface, as demonstrated by vanilla-coke, and (2) the image handling code in CUPS filters, as demonstrated by mksun. | Modified (20071220) | ACCEPT(3) Cole, Cox, Green | NOOP(1) Christey | Christey> MANDRAKE:MDKSA-2003:001 | View |
6975 | CVE-2003-0146 | Candidate | Multiple vulnerabilities in NetPBM 9.20 and earlier, and possibly other versions, may allow remote attackers to cause a denial of service or execute arbitrary code via "maths overflow errors" such as (1) integer signedness errors or (2) integer overflows, which lead to buffer overflows. | Modified (20050311) | ACCEPT(3) Baker, Cole, Green | MODIFY(1) Cox | NOOP(2) Christey, Wall | Christey> MANDRAKE:MDKSA-2003:036 | URL:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:036 | CHANGE> [Cox changed vote from ACCEPT to MODIFY] | Cox> REDHAT:RHSA-2003:061 | Cox> ADDREF REDHAT:RHSA-2003:060 | Christey> MANDRAKE:MDKSA-2003:036 | (as suggested by Vincent Danen of Mandrake) | Christey> CONECTIVA:CLA-2003:656 | View |
6990 | CVE-2003-0161 | Candidate | The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. | Assigned (20030324) | NOOP(1) Christey | Christey> MANDRAKE:MDKSA-2003:042 | (as suggested by Vincent Danen of Mandrake) | View |
6967 | CVE-2003-0138 | Candidate | Version 4 of the Kerberos protocol (krb4), as used in Heimdal and other packages, allows an attacker to impersonate any principal in a realm via a chosen-plaintext attack. | Assigned (20030313) | NOOP(1) Christey | Christey> MANDRAKE:MDKSA-2003:043 | (as suggested by Vincent Danen of Mandrake) | View |
6968 | CVE-2003-0139 | Candidate | Certain weaknesses in the implementation of version 4 of the Kerberos protocol (krb4) in the krb5 distribution, when triple-DES keys are used to key krb4 services, allow an attacker to create krb4 tickets for unauthorized principals using a cut-and-paste attack and "ticket splicing." | Assigned (20030313) | NOOP(1) Christey | Christey> MANDRAKE:MDKSA-2003:043 | (as suggested by Vincent Danen of Mandrake) | View |
Page 20643 of 20943, showing 5 records out of 104715 total, starting on record 103211, ending on 103215