CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3449  CVE-2001-0636  Candidate  Buffer overflows in Raytheon SilentRunner allow remote attackers to (1) cause a denial of service in the collector (cle.exe) component of SilentRunner 2.0 via traffic containing long passwords, or (2) execute arbitrary commands via long HTTP queries in the Knowledge Browser component in SilentRunner 2.0 and 2.0.1. NOTE: It is highly likely that this candidate will be split into multiple candidates.  Proposed (20010829)  ACCEPT(3) Cole, Foat, Ziese | MODIFY(1) Frech | NOOP(3) Armstrong, Christey, Wall | RECAST(2) Baker, Bishop  Bishop> please split it into 2 candidates, one for the DoS and one | for the execute part | Frech> XF:silentrunner-collector-popuser-bo(6795) | XF:silentrunner-collector-poppass-bo(6796) | XF:silentrunner-collector-httpurl-bo(6797) | Baker> SPLIT | Christey> Consider adding BID:3150 | Christey> Consider adding BID:3151  View
3451  CVE-2001-0642  Candidate  Directory traversal vulnerability in IncrediMail version 1400185 and earlier allows local users to overwrite files on the local hard drive by appending .. (dot dot) sequences to filenames listed in the content.ini file.  Proposed (20010829)  ACCEPT(1) Frech | NOOP(5) Cole, Foat, Stracener, Wall, Ziese    View
3458  CVE-2001-0649  Candidate  Personal Web Sharing 1.5.5 allows a remote attacker to cause a denial of service via a long HTTP request.  Proposed (20010829)  ACCEPT(2) Frech, Ziese | NOOP(4) Cole, Foat, Stracener, Wall    View
3482  CVE-2001-0674  Candidate  Directory traversal vulnerability in RobTex Viking Web server before 1.07-381 allows remote attackers to read arbitrary files via a hexadecimal encoded dot-dot attack (eg. http://www.server.com/%2e%2e/%2e%2e) in an HTTP URL request.  Proposed (20010829)  ACCEPT(6) Baker, Cole, Foat, Frech, Stracener, Ziese | NOOP(1) Wall    View
3486  CVE-2001-0678  Candidate  A buffer overflow in reggo.dll file used by Trend Micro InterScan VirusWall prior to 3.51 build 1349 for Windows NT 3.5 and InterScan WebManager 1.2 allows a local attacker to execute arbitrary code.  Proposed (20010829)  ACCEPT(5) Baker, Cole, Frech, Stracener, Ziese | NOOP(2) Foat, Wall | RECAST(1) Christey  Christey> CD:SF-LOC may suggest merging with CVE-2001-0761 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> CONFIRM:http://solutionbank.antivirus.com/solutions/solutionDetail.asp?solutionID=9590 | CONFIRM:http://solutionfile.trendmicro.com/SolutionFile/9590/en/PatchT3419.zip | Also say it"s the Serial Number field, as stated in | ISVWNTBufferOverflowPatch.txt of the zip file. | Since there is a separate patch for CVE-2001-0761 (though no | build number), there is enough evidence to keep these | 2 candidates separate. | CHANGE> [Christey changed vote from REVIEWING to RECAST] | Christey> CONFIRM:http://download.antivirus.com/ftp/products/patches/isapi_security_patch_351b1360.zip | | This patch fixes a number of overflows in various DLL"s, | including RegGo.dll. See Readme_ISNT_BufferOverflowPatchFiles.txt. | By CD:SF-LOC, the same type of issue appears in the same | versions, so CVE-2001-0678 must be RECAST to include the following | *other* issues in 1512: | (1) FtpSaveCSP.dll, (2) FtpSaveCVP.dll, (3) | HttpSaveCSP.dll, (4) HttpSaveCVP.dll, (5) RegGo.dll, (6) ViewLog.dll, | (7) ftpSaveCVP.dll, (8) patupd.dll, (9) smtpscan.dll, or (10) | smtpscanCVP.dll. | | BUGTRAQ:20010612 [SNS Advisory No.31] Trend Micro InterScan VirusWall for Windows NT 3.51 FtpSaveC*P.dll Buffer Overflow Vulnerability | URL:http://archives.neohapsis.com/archives/bugtraq/2001-06/0148.html | XF:interscan-viruswall-ftpsave-bo(6698) | URL:http://xforce.iss.net/static/6698.php  View

Page 273 of 20943, showing 5 records out of 104715 total, starting on record 1361, ending on 1365

Actions