CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5700 | CVE-2002-1316 | Candidate | importInfo in the Admin Server for iPlanet WebServer 4.x, up to SP11, allows the web administrator to execute arbitrary commands via shell metacharacters in the dir parameter, and possibly allows remote attackers to exploit this vulnerability via a separate XSS issue (CVE-2002-1315). | Modified (20071014) | ACCEPT(1) Baker | NOOP(4) Christey, Cole, Cox, Wall | REVIEWING(1) Green | Christey> fix typo: "paramatar" | View |
5705 | CVE-2002-1321 | Candidate | Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename. | Modified (20050708) | ACCEPT(3) Baker, Cole, Green | NOOP(3) Christey, Cox, Wall | Christey> fix typo: "long long" | View |
3578 | CVE-2001-0771 | Candidate | Spytech SpyAnywhere 1.50 allows remote attackers to gain administrator access via a single character in the "loginpass" field. | Proposed (20011012) | ACCEPT(1) Frech | NOOP(5) Armstrong, Christey, Cole, Foat, Wall | Christey> fix typo: "a a" | View |
5415 | CVE-2002-1027 | Candidate | Cross-site scripting vulnerability in the default HTTP 500 error script (500error.jsp) for Macromedia Sitespring 1.2.0 (277.1) allows remote attackers to execute arbitrary web script via a link to 500error.jsp with the script in 1the et parameter. | Proposed (20020830) | ACCEPT(1) Frech | NOOP(5) Christey, Cole, Cox, Foat, Wall | Christey> fix typo: "1the" | View |
6976 | CVE-2003-0147 | Candidate | OpenSSL does not use RSA blinding by default, which allows local and remote attackers to obtain the server"s private key by determining factors using timing differences on (1) the number of extra reductions during Montgomery reduction, and (2) the use of different integer multiplication algorithms ("Karatsuba" and normal). | Modified (20071129) | ACCEPT(4) Baker, Cole, Green, Wall | MODIFY(1) Cox | NOOP(1) Christey | Christey> ENGARDE:ESA-20030320-010 | BUGTRAQ:20030320 [OpenPKG-SA-2003.026] OpenPKG Security Advisory (openssl) | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=104819602408063&w=2 | Christey> FREEBSD:FreeBSD-SA-03:06.openssl | Cox> Addref:http://www.openssl.org/news/secadv_20030317.txt | Christey> MANDRAKE:MDKSA-2003:035 | URL:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:035 | Christey> BUGTRAQ:20030325 GLSA: stunnel (200303-24) | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=104861762028637&w=2 | | Need to change desc to include stunnel | Cox> REDHAT:RHSA-2003:102 | URL:http://www.redhat.com/support/errata/RHSA-2003-102.html | Cox> REDHAT:RHSA-2003:101 | URL:http://www.redhat.com/support/errata/RHSA-2003-101.html | Christey> CONECTIVA:CLA-2003:625 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000625 | Christey> DEBIAN:DSA-288 | URL:http://www.debian.org/security/2003/dsa-288 | Christey> MANDRAKE:MDKSA-2003:035 | (as suggested by Vincent Danen of Mandrake) | Christey> SGI:20030501-01-I | URL:ftp://patches.sgi.com/support/free/security/advisories/20030501-01-I | Christey> REDHAT:RHSA-2003:205 | Christey> CERT-VN:VU#997481 | URL:http://www.kb.cert.org/vuls/id/997481 | View |
Page 309 of 20943, showing 5 records out of 104715 total, starting on record 1541, ending on 1545