CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1961 | CVE-2000-0383 | Candidate | The file transfer component of AOL Instant Messenger (AIM) reveals the physical path of the transferred file to the remote recipient. | Modified (20000706-01) | ACCEPT(5) Cole, Frech, Levy, Ozancin, Stracener | NOOP(3) Baker, Christey, Prosser | Christey> Normalize the Bugtraq reference! | View |
8435 | CVE-2004-0007 | Candidate | Buffer overflow in the Extract Info Field Function for (1) MSN and (2) YMSG protocol handlers in Gaim 0.74 and earlier, and Ultramagnetic before 0.81, allows remote attackers to cause a denial of service and possibly execute arbitrary code. | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Christey> Normalize Gentoo, Slackware reference | Christey> CERT-VN:VU#197142 | View |
284 | CVE-1999-0285 | Candidate | Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection. | Proposed (19990630) | ACCEPT(1) Hill | NOOP(2) Baker, Wall | REJECT(2) Christey, Frech | Christey> No references, no information. | CHANGE> [Frech changed vote from REVIEWING to REJECT] | Frech> No references; closest documented match is with | CVE-2001-0346, but that"s for Windows 2000. | View |
4032 | CVE-2001-1228 | Candidate | Buffer overflows in gzip 1.3x, 1.2.4, and other versions might allow attackers to execute code via a long file name, possibly remotely if gzip is run on an FTP server. | Modified (20020817-01) | ACCEPT(3) Cole, Green, Wall | MODIFY(1) Frech | NOOP(3) Christey, Cox, Foat | Christey> NETBSD:NetBSD-SA2002-002 | URL:ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-002.txt.asc | Frech> XF:gzip-long-filename-bo(7882) | View |
5113 | CVE-2002-0723 | Candidate | Microsoft Internet Explorer 5.5 and 6.0 does not properly verify the domain of a frame within a browser window, which allows remote attackers to read client files or invoke executable objects via the Object tag, aka "Cross Domain Verification in Object Tag." | Modified (20030324-01) | ACCEPT(5) Armstrong, Baker, Cole, Foat, Wall | MODIFY(1) Frech | NOOP(2) Christey, Cox | Christey> Need to verify with Microsoft that this is: | BUGTRAQ:20020710 IE allows universal Cross Domain Scripting (TL#003) | URL:http://www.securityfocus.com/archive/1/281367 | MISC:http://www.PivX.com/larholm/adv/TL003/ | BUGTRAQ:20020710 Exploit: TL003/Dot Bug = Reading Non-Parsable Files | URL:http://www.securityfocus.com/archive/1/281660 | Frech> XF:ie-object-scripting(9537) | View |
Page 296 of 20943, showing 5 records out of 104715 total, starting on record 1476, ending on 1480