CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4848 | CVE-2002-0456 | Candidate | Eudora 5.1 and earlier versions stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames. | Proposed (20020611) | ACCEPT(3) Cole, Frech, Green | NOOP(3) Cox, Foat, Wall | REVIEWING(1) Christey | Green> INCLUSION RATIONALE IS A REASONABLE APPROACH | Christey> Overlap CVE-2002-1210 ? | View |
4847 | CVE-2002-0455 | Candidate | IncrediMail stores attachments in a directory with a fixed name, which could make it easier for attackers to exploit vulnerabilities in other software that rely on installing and reading files from directories with known pathnames. | Proposed (20020611) | ACCEPT(2) Frech, Green | NOOP(4) Cole, Cox, Foat, Wall | Green> INCLUSION RATIONALE IS A REASONABLE APROACH | View |
6876 | CVE-2003-0047 | Candidate | SSH2 clients for VanDyke (1) SecureCRT 4.0.2 and 3.4.7, (2) SecureFX 2.1.2 and 2.0.4, and (3) Entunnel 1.0.2 and earlier, do not clear logon credentials from memory, including plaintext passwords, which could allow attackers with access to memory to steal the SSH credentials. | Modified (20071121) | ACCEPT(2) Baker, Stracener | NOOP(4) Cole, Cox, Green, Wall | Green> MULTIPLE VENDORS INVOLVED | Stracener> I"m going to go with this because at least two of the affected vendors acknowledged a fix in the original advisory. | View |
5551 | CVE-2002-1167 | Candidate | Cross-site scripting (XSS) vulnerability in IBM Web Traffic Express Caching Proxy Server 3.6 and 4.x before 4.0.1.26 allows remote attackers to execute script as other users via an HTTP GET request. | Proposed (20030317) | ACCEPT(3) Armstrong, Cole, Green | NOOP(1) Cox | Green> PATCH RELEASED BY VENDOR | View |
5552 | CVE-2002-1168 | Candidate | Cross-site scripting (XSS) vulnerability in IBM Web Traffic Express Caching Proxy Server 3.6 and 4.x before 4.0.1.26 allows remote attackers to execute script as other users via an HTTP request that contains an Location: header with a "%0a%0d" (CRLF) sequence, which echoes the Location as an HTTP header in the server response. | Proposed (20030317) | ACCEPT(3) Armstrong, Cole, Green | NOOP(2) Christey, Cox | Green> PATCH RELEASED BY VENDOR | Christey> fix typo - "an location" | View |
Page 20901 of 20943, showing 5 records out of 104715 total, starting on record 104501, ending on 104505