CVE List

Id CVE No. Status Description Phase Votes Comments Actions
8592  CVE-2004-0164  Candidate  KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c.  Modified (20100819)  ACCEPT(4) Armstrong, Baker, Cole, Cox | NOOP(2) Christey, Wall  CHANGE> [Cox changed vote from NOOP to ACCEPT] | Christey> REDHAT:RHSA-2004:165 | URL:http://www.redhat.com/support/errata/RHSA-2004-165.html | Christey> SCO:SCOSA-2005.10 | URL:ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt  View
2758  CVE-2000-1191  Candidate  htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path.  Modified (20100819)  ACCEPT(1) Stracener | MODIFY(1) Frech | NOOP(4) Cole, Foat, Wall, Williams  Frech> XF:htdig-htsearch-path-disclosure(7367) | MISC reference should be | http://www.securiteam.com/exploits/5YQ0C000IU.html.  View
6885  CVE-2003-0056  Candidate  Buffer overflow in secure locate (slocate) before 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument.  Modified (20100819)  ACCEPT(4) Armstrong, Cole, Green, Jones | NOOP(2) Christey, Cox  Christey> REDHAT:RHSA-2004:041 | URL:http://www.redhat.com/support/errata/RHSA-2004-041.html | Christey> SGI:20040201-01-U  View
8431  CVE-2004-0003  Candidate  Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking."  Modified (20100819)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Christey> DEBIAN:DSA-479 | URL:http://www.debian.org/security/2004/dsa-479 | DEBIAN:DSA-480 | URL:http://www.debian.org/security/2004/dsa-480 | DEBIAN:DSA-481 | URL:http://www.debian.org/security/2004/dsa-481 | DEBIAN:DSA-482 | URL:http://www.debian.org/security/2004/dsa-482 | Christey> DEBIAN:DSA-489 | URL:http://www.debian.org/security/2004/dsa-489 | DEBIAN:DSA-491 | URL:http://www.debian.org/security/2004/dsa-491 | Christey> DEBIAN:DSA-495 | URL:http://www.debian.org/security/2004/dsa-495 | REDHAT:RHSA-2004:166 | URL:http://rhn.redhat.com/errata/RHSA-2004-166.html | Christey> REDHAT:RHSA-2004:188 | URL:http://www.redhat.com/support/errata/RHSA-2004-188.html | Christey> CONECTIVA:CLA-2004:846 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846  View
8434  CVE-2004-0006  Candidate  Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect.  Modified (20100819)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall  Cox> Although the 0.59.1 version of Gaim shipped by Red Hat contained these | flaws, Yahoo connections were not functional and therefore the majority of | the issues could not be exploited, leading to the abstraction comment above. | Christey> CERT-VN:VU#871838 | URL:http://www.kb.cert.org/vuls/id/871838 | CERT-VN:VU#444158 | URL:http://www.kb.cert.org/vuls/id/444158 | CERT-VN:VU#503030 | URL:http://www.kb.cert.org/vuls/id/503030 | CERT-VN:VU#371382 | URL:http://www.kb.cert.org/vuls/id/371382 | CERT-VN:VU#297198 | URL:http://www.kb.cert.org/vuls/id/297198 | CERT-VN:VU#527142 | URL:http://www.kb.cert.org/vuls/id/527142 | Christey> Normalize Gentoo reference  View

Page 432 of 20943, showing 5 records out of 104715 total, starting on record 2156, ending on 2160

Actions