CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3216 | CVE-2001-0398 | Candidate | The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment"s type with a different icon. | Proposed (20010524) | ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(3) Christey, Wall, Ziese | Frech> XF:thebat-masked-file-type(6324) | Christey> Add affected version: 1.51 was reported in the original post. | View |
3217 | CVE-2001-0399 | Candidate | Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. | Proposed (20010524) | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | Frech> XF:resin-view-javabean(6320) | View |
3218 | CVE-2001-0400 | Candidate | nph-maillist.pl allows remote attackers to execute arbitrary commands via shell metacharacters ("`") in the email address. | Proposed (20010524) | ACCEPT(1) Williams | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | Frech> XF:nph-maillist-execute-code(6363) | View |
3221 | CVE-2001-0403 | Candidate | /opt/JSparm/bin/perfmon program in Solaris allows local users to create arbitrary files as root via the Logging File option in the GUI. | Proposed (20010524) | ACCEPT(2) Baker, Frech | NOOP(3) Cole, Wall, Ziese | View | |
3222 | CVE-2001-0404 | Candidate | Directory traversal vulnerability in JavaServer Web Dev Kit (JSWDK) 1.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP request to the WEB-INF directory. | Proposed (20010524) | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | Frech> XF:jswdk-directory-traversal(6312) | View |
Page 20651 of 20943, showing 5 records out of 104715 total, starting on record 103251, ending on 103255