CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4450  CVE-2002-0056  Candidate  Buffer overflow in SQL Server 7.0 and 2000 allows remote attackers to execute arbitrary code via a long OLE DB provider name to (1) OpenDataSource or (2) OpenRowset in an ad hoc connection.  Modified (20061101)  ACCEPT(5) Cole, Foat, Green, Wall, Ziese | MODIFY(1) Christey  Christey> Consider adding BID:4135 | CHANGE> [Christey changed vote from NOOP to MODIFY] | Christey> ADDREF BID:4135 | XF:mssql-oledb-adhoc-bo(8243) | URL:http://www.iss.net/security_center/static/8243.php | Christey> CIAC:M-044 | URL:http://www.ciac.org/ciac/bulletins/m-044.shtml | CERT-VN:VU#619707 | URL:http://www.kb.cert.org/vuls/id/619707  View
4471  CVE-2002-0077  Candidate  Microsoft Internet Explorer 5.01, 5.5 and 6.0 treats objects invoked on an HTML page with the codebase property as part of Local Computer zone, which allows remote attackers to invoke executables present on the local system through objects such as the popup object, aka the "Local Executable Invocation via Object tag" vulnerability.  Proposed (20020502)  ACCEPT(5) Armstrong, Cole, Foat, Green, Wall | MODIFY(1) Frech | NOOP(2) Christey, Cox  Christey> Consider adding BID:3867 | Christey> According to Microsoft, the fix for this issue also addresses: | BUGTRAQ:20020227 IE execution of arbitrary commands without Active Scripting or ActiveX (GM#001-IE) | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=101496184505815&w=2 | | Need to add this reference (and/or double-check to make sure | this is the right issue) and consider modifying the | description accordingly, though on the surface there | does not appear to be any close relation, since the | GreyMagic bug deals with Data Source (DSO) | for Data Binding with the dataFormatAs attribute set to HTML, then | using innerHTML for script injection. | Frech> XF:ie-codebase-execute-programs(7941) | Christey> Add BID:3867  View
3830  CVE-2001-1026  Candidate  Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address.  Modified (20050706)  ACCEPT(2) Cole, Frech | NOOP(4) Armstrong, Christey, Foat, Wall | REVIEWING(1) Green  Christey> Consider adding BID:2996 | Christey> Consider adding BID:2998 | Christey> Consider adding BID:2999 | Christey> Consider adding BID:3000 | Christey> fix typo: "leading a leading"  View
3489  CVE-2001-0681  Candidate  Buffer overflow in ftpd in QPC QVT/Net 5.0 and QVT/Term 5.0 allows a remote attacker to cause a denial of service via a long (1) username or (2) password.  Proposed (20010829)  ACCEPT(2) Frech, Ziese | MODIFY(1) Christey | NOOP(3) Cole, Foat, Wall  Christey> Consider adding 4.3 as an affected version for QVT/Net, | as implied by the FTP banner in the Bugtraq post.  View
2139  CVE-2000-0563  Candidate  The URLConnection function in MacOS Runtime Java (MRJ) 2.1 and earlier and the Microsoft virtual machine (VM) for MacOS allows a malicious web site operator to connect to arbitrary hosts using a HTTP redirection, in violation of the Java security model.  Proposed (20000712)  ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(2) Christey, Wall | REVIEWING(1) LeBlanc  Christey> Confirmed by Scott Culp, but this only applies to | outdated/unsupported versions of the JVM. | Frech> XF:macos-java-security-ignored(5052) | Christey> Consult with Microsoft to ensure that this is fixed by | MS:MS00-059. If so, then this might not just be in MacOS.  View

Page 317 of 20943, showing 5 records out of 104715 total, starting on record 1581, ending on 1585

Actions