CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3383 | CVE-2001-0570 | Candidate | minicom 1.83.1 and earlier allows a local attacker to gain additional privileges via numerous format string attacks. | Proposed (20010727) | ACCEPT(4) Cole, Frech, Prosser, Wall | NOOP(2) Foat, Ziese | REVIEWING(1) Bishop | View | |
3384 | CVE-2001-0571 | Candidate | Directory traversal vulnerability in the web server for (1) Elron Internet Manager (IM) Message Inspector and (2) Anti-Virus before 3.0.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the requested URL. | Proposed (20010727) | ACCEPT(5) Baker, Bishop, Cole, Wall, Ziese | MODIFY(1) Frech | NOOP(1) Foat | REVIEWING(1) Williams | Frech> XF:elronim-antivirus-directory-traversal(6959) | XF:elronim-inspector-directory-traversal(6960) | CONFIRM:http://www.elronsw.com/connection/story194a.html | View |
3385 | CVE-2001-0572 | Candidate | The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands. | Proposed (20010727) | ACCEPT(3) Baker, Cole, Williams | MODIFY(1) Frech | NOOP(4) Christey, Foat, Wall, Ziese | REVIEWING(1) Bishop | Frech> XF:ssh-plaintext-length-field(6783) | Christey> REDHAT:RHSA-2001:041 | (obsoletes REDHAT:RHSA-2001:033, according to Red Hat) | TURBO:TLSA2001021 | URL:http://www.turbolinux.com/pipermail/tl-security-announce/2001-May/000309.html | Christey> CISCO:20010627 Multiple SSH Vulnerabilities | http://www.cisco.com/warp/public/707/SSH-multiple-pub.html | View |
3392 | CVE-2001-0579 | Candidate | lpadmin in SCO OpenServer 5.0.6 can allow a local attacker to gain additional privileges via a buffer overflow attack in the first argument to the command. | Proposed (20010727) | ACCEPT(2) Frech, Williams | MODIFY(1) Bishop | NOOP(4) Cole, Foat, Wall, Ziese | RECAST(1) Baker | Bishop> recommend combining as stated in analysis | Baker> Merge with CVE-2001-0575, which has vendor acknowledgement, and includes this as one of the binaries with the same problem. | View |
3393 | CVE-2001-0580 | Candidate | Hughes Technologies Virtual DNS (VDNS) Server 1.0 allows a remote attacker to create a denial of service by connecting to port 6070, sending some data, and closing the connection. | Proposed (20010727) | MODIFY(1) Frech | NOOP(5) Christey, Cole, Foat, Wall, Ziese | REVIEWING(1) Bishop | Christey> BID:2700 | URL:http://www.securityfocus.com/bid/2700 | Christey> XF:vdns-default-closed-dos(6507) | Frech> XF:vdns-default-closed-dos(6507) | There is a 2.0 version at | http://html.hughestech.com/index.html, but I could not find any | mention of fixes. | View |
Page 279 of 20943, showing 5 records out of 104715 total, starting on record 1391, ending on 1395