CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
2311 | CVE-2000-0735 | Candidate | Buffer overflow in Becky! Internet Mail client 1.26.03 and earlier allows remote attackers to cause a denial of service via a long Content-type: MIME header when the user replies to a message. | Proposed (20000921) | ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Christey> XF:becky-imail-header-dos | http://xforce.iss.net/static/5110.php | Frech> XF:becky-imail-header-dos(5110) | View |
2312 | CVE-2000-0736 | Candidate | Buffer overflow in Becky! Internet Mail client 1.26.04 and earlier allows remote attackers to cause a denial of service via a long Content-type: MIME header when the user forwards a message. | Proposed (20000921) | ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Christey> XF:becky-imail-header-dos | http://xforce.iss.net/static/5110.php | Frech> XF:becky-imail-header-dos(5110) | View |
5676 | CVE-2002-1292 | Candidate | The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running. | Modified (20050510) | ACCEPT(3) Cole, Green, Wall | NOOP(2) Christey, Cox | Christey> Why is MS02-069 included here? This CAN is not mentioned in | the bulletin. | View |
3487 | CVE-2001-0679 | Candidate | A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server. | Proposed (20010912) | ACCEPT(3) Cole, Foat, Frech | NOOP(1) Wall | REJECT(1) Christey | Christey> Whoops, DUPE CVE-1999-1529. | View |
506 | CVE-1999-0509 | Candidate | Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands. | Modified (20000114-01) | ACCEPT(2) Northcutt, Wall | MODIFY(1) Frech | NOOP(1) Baker | REVIEWING(1) Christey | Christey> What is the right level of abstraction to use here? Should | we combine all possible interpreters into a single entry, | or have a different entry for each one? I"ve often seen | Perl separated from other interpreters - is it included | by default in some Windows web server configurations? | Christey> Add tcsh, zsh, bash, rksh, ksh, ash, to support search. | Frech> XF:http-cgi-vuln(146) | View |
Page 277 of 20943, showing 5 records out of 104715 total, starting on record 1381, ending on 1385