CVE List

Id CVE No. Status Description Phase Votes Comments Actions
2311  CVE-2000-0735  Candidate  Buffer overflow in Becky! Internet Mail client 1.26.03 and earlier allows remote attackers to cause a denial of service via a long Content-type: MIME header when the user replies to a message.  Proposed (20000921)  ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Christey> XF:becky-imail-header-dos | http://xforce.iss.net/static/5110.php | Frech> XF:becky-imail-header-dos(5110)  View
2312  CVE-2000-0736  Candidate  Buffer overflow in Becky! Internet Mail client 1.26.04 and earlier allows remote attackers to cause a denial of service via a long Content-type: MIME header when the user forwards a message.  Proposed (20000921)  ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Christey> XF:becky-imail-header-dos | http://xforce.iss.net/static/5110.php | Frech> XF:becky-imail-header-dos(5110)  View
5676  CVE-2002-1292  Candidate  The Microsoft Java virtual machine (VM) build 5.0.3805 and earlier, as used in Internet Explorer, allows remote attackers to extend the Standard Security Manager (SSM) class (com.ms.security.StandardSecurityManager) and bypass intended StandardSecurityManager restrictions by modifying the (1) deniedDefinitionPackages or (2) deniedAccessPackages settings, causing a denial of service by adding Java applets to the list of applets that are prevented from running.  Modified (20050510)  ACCEPT(3) Cole, Green, Wall | NOOP(2) Christey, Cox  Christey> Why is MS02-069 included here? This CAN is not mentioned in | the bulletin.  View
3487  CVE-2001-0679  Candidate  A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server.  Proposed (20010912)  ACCEPT(3) Cole, Foat, Frech | NOOP(1) Wall | REJECT(1) Christey  Christey> Whoops, DUPE CVE-1999-1529.  View
506  CVE-1999-0509  Candidate  Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands.  Modified (20000114-01)  ACCEPT(2) Northcutt, Wall | MODIFY(1) Frech | NOOP(1) Baker | REVIEWING(1) Christey  Christey> What is the right level of abstraction to use here? Should | we combine all possible interpreters into a single entry, | or have a different entry for each one? I"ve often seen | Perl separated from other interpreters - is it included | by default in some Windows web server configurations? | Christey> Add tcsh, zsh, bash, rksh, ksh, ash, to support search. | Frech> XF:http-cgi-vuln(146)  View

Page 277 of 20943, showing 5 records out of 104715 total, starting on record 1381, ending on 1385

Actions