CVE List

Id CVE No. Status Description Phase Votes Comments Actions
6979  CVE-2003-0150  Candidate  MySQL 3.23.55 and earlier creates world-writeable files and allows mysql users to gain root privileges by using the "SELECT * INFO OUTFILE" operator to overwrite a configuration file and cause mysql to run as root upon restart, as demonstrated by modifying my.cnf.  Assigned (20030318)  NOOP(1) Christey  Christey> DEBIAN:DSA-303 | URL:http://www.debian.org/security/2003/dsa-303  View
6973  CVE-2003-0144  Candidate  Buffer overflow in the lprm command in the lprold lpr package on SuSE 7.1 through 7.3, OpenBSD 3.2 and earlier, and possibly other operating systems, allows local users to gain root privileges via long command line arguments such as (1) request ID or (2) user name.  Modified (20071113)  ACCEPT(4) Armstrong, Cole, Green, Jones | NOOP(2) Christey, Cox  Christey> DEBIAN:DSA-267 | URL:http://www.debian.org/security/2003/dsa-267 | Christey> DEBIAN:DSA-275 | URL:http://www.debian.org/security/2003/dsa-275 | Christey> DEBIAN:DSA-267 | URL:http://www.debian.org/security/2003/dsa-267 | Christey> SGI:20030406-02-P | Christey> MANDRAKE:MDKSA-2003:059 | URL:http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:059  View
5770  CVE-2002-1386  Candidate  Buffer overflow in traceroute-nanog (aka traceroute-ng) may allow local users to execute arbitrary code via a long hostname argument.  Modified (20050601)  ACCEPT(1) Baker | NOOP(4) Christey, Cole, Cox, Wall | REVIEWING(1) Green  Christey> DEBIAN:DSA-254 | BID:6274 | SUSE:SuSE-SA:2002:043  View
5056  CVE-2002-0666  Candidate  IPSEC implementations including (1) FreeS/WAN and (2) KAME do not properly calculate the length of authentication data, which allows remote attackers to cause a denial of service (kernel panic) via spoofed, short Encapsulating Security Payload (ESP) packets, which result in integer signedness errors.  Modified (20050601)  ACCEPT(3) Baker, Cole, Frech | NOOP(3) Christey, Cox, Wall  Christey> DEBIAN:DSA-201  View
4745  CVE-2002-0353  Candidate  The ASN.1 parser in Ethereal 0.9.2 and earlier allows remote attackers to cause a denial of service (crash) via a certain malformed packet, which causes Ethereal to allocate memory incorrectly, possibly due to zero-length fields.  Modified (20020817-01)  ACCEPT(4) Armstrong, Cole, Cox, Green | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall  Christey> DEBIAN:DSA-130 | Christey> REDHAT:RHSA-2002:088 | URL:http://www.redhat.com/support/errata/RHSA-2002-088.html | BID:4604 | URL:http://www.securityfocus.com/bid/4604 | Christey> XF:ethereal-asn1-dos(8952) | URL:http://www.iss.net/security_center/static/8952.php | Frech> XF:ethereal-asn1-dos(8952) | Christey> CALDERA:CSSA-2002-037.0 | URL:ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2002-037.0.txt | Christey> REDHAT:RHSA-2002:036 | URL:http://www.redhat.com/support/errata/RHSA-2002-036.html  View

Page 313 of 20943, showing 5 records out of 104715 total, starting on record 1561, ending on 1565

Actions