CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3216  CVE-2001-0398  Candidate  The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment"s type with a different icon.  Proposed (20010524)  ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(3) Christey, Wall, Ziese  Frech> XF:thebat-masked-file-type(6324) | Christey> Add affected version: 1.51 was reported in the original post.  View
3217  CVE-2001-0399  Candidate  Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request.  Proposed (20010524)  MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese  Frech> XF:resin-view-javabean(6320)  View
3218  CVE-2001-0400  Candidate  nph-maillist.pl allows remote attackers to execute arbitrary commands via shell metacharacters ("`") in the email address.  Proposed (20010524)  ACCEPT(1) Williams | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese  Frech> XF:nph-maillist-execute-code(6363)  View
3221  CVE-2001-0403  Candidate  /opt/JSparm/bin/perfmon program in Solaris allows local users to create arbitrary files as root via the Logging File option in the GUI.  Proposed (20010524)  ACCEPT(2) Baker, Frech | NOOP(3) Cole, Wall, Ziese    View
3222  CVE-2001-0404  Candidate  Directory traversal vulnerability in JavaServer Web Dev Kit (JSWDK) 1.0.1 allows remote attackers to read arbitrary files via a .. (dot dot) in an HTTP request to the WEB-INF directory.  Proposed (20010524)  MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese  Frech> XF:jswdk-directory-traversal(6312)  View

Page 20651 of 20943, showing 5 records out of 104715 total, starting on record 103251, ending on 103255

Actions