CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3674  CVE-2001-0868  Candidate  Red Hat Stronghold 2.3 to 3.0 allows remote attackers to retrieve system information via an HTTP GET request to (1) stronghold-info or (2) stronghold-status.  Modified (20120911)  NOOP(3) Armstrong, Cole, Foat | REVIEWING(1) Wall    View
5588  CVE-2002-1204  Candidate  Netscape Communicator 4.x allows attackers to use a link to steal a user"s preferences, including potentially sensitive information such as URL history, e-mail address, and possibly the e-mail password, by redefining the user_pref() function and accessing the prefs.js file, which is stored in a directory with a predictable name.  Modified (20050610)  NOOP(3) Armstrong, Cole, Cox | REVIEWING(1) Wall    View
1859  CVE-2000-0281  Candidate  Buffer overflow in the Napster client beta 5 allows remote attackers to cause a denial of service via a long message.  Proposed (20000426)  NOOP(2) Cole, Wall | REJECT(3) Baker, Frech, Levy  Frech> Does not meet CVE candidate requirements. The problem was remedied on the | server end, and no fault exists at the client. Based on | http://archives.neohapsis.com/archives/bugtraq/2000-03/0299.html: | Approximately one hour after receiving the post from BugTraq, | Napster"s servers were patched to prevent this from occurring. | Users of the Napster Win32 client software are NOT vulnerable. | Baker> Agree with Andre  View
1390  CVE-1999-1410  Candidate  addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file.  Proposed (20010912)  NOOP(2) Cole, Foat | REJECT(2) Christey, Frech  Christey> DUPE CVE-1999-1286 | Need to add these references to CVE-1999-1286  View
4596  CVE-2002-0204  Candidate  Buffer overflow in GNU Chess (gnuchess) 5.02 and earlier, if modified or used in a networked capacity contrary to its own design as a single-user application, may allow local or remote attackers to execute arbitrary code via a long command.  Proposed (20020502)  NOOP(2) Cole, Foat | REJECT(1) Wall | REVIEWING(1) Green  Green> The issue of modifying code and/or using code for purposes other than intended raises the hypothetical (albeit ridiculous) prospect of having to classify vulnerabilities within gcc, since one could develop malicious code using the compiler.  View

Page 30 of 20943, showing 5 records out of 104715 total, starting on record 146, ending on 150

Actions