CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4450 | CVE-2002-0056 | Candidate | Buffer overflow in SQL Server 7.0 and 2000 allows remote attackers to execute arbitrary code via a long OLE DB provider name to (1) OpenDataSource or (2) OpenRowset in an ad hoc connection. | Modified (20061101) | ACCEPT(5) Cole, Foat, Green, Wall, Ziese | MODIFY(1) Christey | Christey> Consider adding BID:4135 | CHANGE> [Christey changed vote from NOOP to MODIFY] | Christey> ADDREF BID:4135 | XF:mssql-oledb-adhoc-bo(8243) | URL:http://www.iss.net/security_center/static/8243.php | Christey> CIAC:M-044 | URL:http://www.ciac.org/ciac/bulletins/m-044.shtml | CERT-VN:VU#619707 | URL:http://www.kb.cert.org/vuls/id/619707 | View |
4471 | CVE-2002-0077 | Candidate | Microsoft Internet Explorer 5.01, 5.5 and 6.0 treats objects invoked on an HTML page with the codebase property as part of Local Computer zone, which allows remote attackers to invoke executables present on the local system through objects such as the popup object, aka the "Local Executable Invocation via Object tag" vulnerability. | Proposed (20020502) | ACCEPT(5) Armstrong, Cole, Foat, Green, Wall | MODIFY(1) Frech | NOOP(2) Christey, Cox | Christey> Consider adding BID:3867 | Christey> According to Microsoft, the fix for this issue also addresses: | BUGTRAQ:20020227 IE execution of arbitrary commands without Active Scripting or ActiveX (GM#001-IE) | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=101496184505815&w=2 | | Need to add this reference (and/or double-check to make sure | this is the right issue) and consider modifying the | description accordingly, though on the surface there | does not appear to be any close relation, since the | GreyMagic bug deals with Data Source (DSO) | for Data Binding with the dataFormatAs attribute set to HTML, then | using innerHTML for script injection. | Frech> XF:ie-codebase-execute-programs(7941) | Christey> Add BID:3867 | View |
3830 | CVE-2001-1026 | Candidate | Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address. | Modified (20050706) | ACCEPT(2) Cole, Frech | NOOP(4) Armstrong, Christey, Foat, Wall | REVIEWING(1) Green | Christey> Consider adding BID:2996 | Christey> Consider adding BID:2998 | Christey> Consider adding BID:2999 | Christey> Consider adding BID:3000 | Christey> fix typo: "leading a leading" | View |
3489 | CVE-2001-0681 | Candidate | Buffer overflow in ftpd in QPC QVT/Net 5.0 and QVT/Term 5.0 allows a remote attacker to cause a denial of service via a long (1) username or (2) password. | Proposed (20010829) | ACCEPT(2) Frech, Ziese | MODIFY(1) Christey | NOOP(3) Cole, Foat, Wall | Christey> Consider adding 4.3 as an affected version for QVT/Net, | as implied by the FTP banner in the Bugtraq post. | View |
2139 | CVE-2000-0563 | Candidate | The URLConnection function in MacOS Runtime Java (MRJ) 2.1 and earlier and the Microsoft virtual machine (VM) for MacOS allows a malicious web site operator to connect to arbitrary hosts using a HTTP redirection, in violation of the Java security model. | Proposed (20000712) | ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(2) Christey, Wall | REVIEWING(1) LeBlanc | Christey> Confirmed by Scott Culp, but this only applies to | outdated/unsupported versions of the JVM. | Frech> XF:macos-java-security-ignored(5052) | Christey> Consult with Microsoft to ensure that this is fixed by | MS:MS00-059. If so, then this might not just be in MacOS. | View |
Page 317 of 20943, showing 5 records out of 104715 total, starting on record 1581, ending on 1585