CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3449 | CVE-2001-0636 | Candidate | Buffer overflows in Raytheon SilentRunner allow remote attackers to (1) cause a denial of service in the collector (cle.exe) component of SilentRunner 2.0 via traffic containing long passwords, or (2) execute arbitrary commands via long HTTP queries in the Knowledge Browser component in SilentRunner 2.0 and 2.0.1. NOTE: It is highly likely that this candidate will be split into multiple candidates. | Proposed (20010829) | ACCEPT(3) Cole, Foat, Ziese | MODIFY(1) Frech | NOOP(3) Armstrong, Christey, Wall | RECAST(2) Baker, Bishop | Bishop> please split it into 2 candidates, one for the DoS and one | for the execute part | Frech> XF:silentrunner-collector-popuser-bo(6795) | XF:silentrunner-collector-poppass-bo(6796) | XF:silentrunner-collector-httpurl-bo(6797) | Baker> SPLIT | Christey> Consider adding BID:3150 | Christey> Consider adding BID:3151 | View |
3451 | CVE-2001-0642 | Candidate | Directory traversal vulnerability in IncrediMail version 1400185 and earlier allows local users to overwrite files on the local hard drive by appending .. (dot dot) sequences to filenames listed in the content.ini file. | Proposed (20010829) | ACCEPT(1) Frech | NOOP(5) Cole, Foat, Stracener, Wall, Ziese | View | |
3458 | CVE-2001-0649 | Candidate | Personal Web Sharing 1.5.5 allows a remote attacker to cause a denial of service via a long HTTP request. | Proposed (20010829) | ACCEPT(2) Frech, Ziese | NOOP(4) Cole, Foat, Stracener, Wall | View | |
3482 | CVE-2001-0674 | Candidate | Directory traversal vulnerability in RobTex Viking Web server before 1.07-381 allows remote attackers to read arbitrary files via a hexadecimal encoded dot-dot attack (eg. http://www.server.com/%2e%2e/%2e%2e) in an HTTP URL request. | Proposed (20010829) | ACCEPT(6) Baker, Cole, Foat, Frech, Stracener, Ziese | NOOP(1) Wall | View | |
3486 | CVE-2001-0678 | Candidate | A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code. | Proposed (20010829) | ACCEPT(5) Baker, Cole, Frech, Stracener, Ziese | NOOP(2) Foat, Wall | RECAST(1) Christey | Christey> CD:SF-LOC may suggest merging with CVE-2001-0761 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> CONFIRM:http://solutionbank.antivirus.com/solutions/solutionDetail.asp?solutionID=9590 | CONFIRM:http://solutionfile.trendmicro.com/SolutionFile/9590/en/PatchT3419.zip | Also say it"s the Serial Number field, as stated in | ISVWNTBufferOverflowPatch.txt of the zip file. | Since there is a separate patch for CVE-2001-0761 (though no | build number), there is enough evidence to keep these | 2 candidates separate. | CHANGE> [Christey changed vote from REVIEWING to RECAST] | Christey> CONFIRM:http://download.antivirus.com/ftp/products/patches/isapi_security_patch_351b1360.zip | | This patch fixes a number of overflows in various DLL"s, | including RegGo.dll. See Readme_ISNT_BufferOverflowPatchFiles.txt. | By CD:SF-LOC, the same type of issue appears in the same | versions, so CVE-2001-0678 must be RECAST to include the following | *other* issues in 1512: | (1) FtpSaveCSP.dll, (2) FtpSaveCVP.dll, (3) | HttpSaveCSP.dll, (4) HttpSaveCVP.dll, (5) RegGo.dll, (6) ViewLog.dll, | (7) ftpSaveCVP.dll, (8) patupd.dll, (9) smtpscan.dll, or (10) | smtpscanCVP.dll. | | BUGTRAQ:20010612 [SNS Advisory No.31] Trend Micro InterScan VirusWall for Windows NT 3.51 FtpSaveC*P.dll Buffer Overflow Vulnerability | URL:http://archives.neohapsis.com/archives/bugtraq/2001-06/0148.html | XF:interscan-viruswall-ftpsave-bo(6698) | URL:http://xforce.iss.net/static/6698.php | View |
Page 273 of 20943, showing 5 records out of 104715 total, starting on record 1361, ending on 1365