CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
8592 | CVE-2004-0164 | Candidate | KAME IKE daemon (racoon) does not properly handle hash values, which allows remote attackers to delete certificates via (1) a certain delete message that is not properly handled in isakmp.c or isakmp_inf.c, or (2) a certain INITIAL-CONTACT message that is not properly handled in isakmp_inf.c. | Modified (20100819) | ACCEPT(4) Armstrong, Baker, Cole, Cox | NOOP(2) Christey, Wall | CHANGE> [Cox changed vote from NOOP to ACCEPT] | Christey> REDHAT:RHSA-2004:165 | URL:http://www.redhat.com/support/errata/RHSA-2004-165.html | Christey> SCO:SCOSA-2005.10 | URL:ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2005.10/SCOSA-2005.10.txt | View |
2758 | CVE-2000-1191 | Candidate | htsearch program in htDig 3.2 beta, 3.1.6, 3.1.5, and earlier allows remote attackers to determine the physical path of the server by requesting a non-existent configuration file using the config parameter, which generates an error message that includes the full path. | Modified (20100819) | ACCEPT(1) Stracener | MODIFY(1) Frech | NOOP(4) Cole, Foat, Wall, Williams | Frech> XF:htdig-htsearch-path-disclosure(7367) | MISC reference should be | http://www.securiteam.com/exploits/5YQ0C000IU.html. | View |
6885 | CVE-2003-0056 | Candidate | Buffer overflow in secure locate (slocate) before 2.7 allows local users to execute arbitrary code via a long (1) -c or (2) -r command line argument. | Modified (20100819) | ACCEPT(4) Armstrong, Cole, Green, Jones | NOOP(2) Christey, Cox | Christey> REDHAT:RHSA-2004:041 | URL:http://www.redhat.com/support/errata/RHSA-2004-041.html | Christey> SGI:20040201-01-U | View |
8431 | CVE-2004-0003 | Candidate | Unknown vulnerability in Linux kernel before 2.4.22 allows local users to gain privileges, related to "R128 DRI limits checking." | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Christey> DEBIAN:DSA-479 | URL:http://www.debian.org/security/2004/dsa-479 | DEBIAN:DSA-480 | URL:http://www.debian.org/security/2004/dsa-480 | DEBIAN:DSA-481 | URL:http://www.debian.org/security/2004/dsa-481 | DEBIAN:DSA-482 | URL:http://www.debian.org/security/2004/dsa-482 | Christey> DEBIAN:DSA-489 | URL:http://www.debian.org/security/2004/dsa-489 | DEBIAN:DSA-491 | URL:http://www.debian.org/security/2004/dsa-491 | Christey> DEBIAN:DSA-495 | URL:http://www.debian.org/security/2004/dsa-495 | REDHAT:RHSA-2004:166 | URL:http://rhn.redhat.com/errata/RHSA-2004-166.html | Christey> REDHAT:RHSA-2004:188 | URL:http://www.redhat.com/support/errata/RHSA-2004-188.html | Christey> CONECTIVA:CLA-2004:846 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000846 | View |
8434 | CVE-2004-0006 | Candidate | Multiple buffer overflows in Gaim 0.75 and earlier, and Ultramagnetic before 0.81, allow remote attackers to cause a denial of service and possibly execute arbitrary code via (1) cookies in a Yahoo web connection, (2) a long name parameter in the Yahoo login web page, (3) a long value parameter in the Yahoo login page, (4) a YMSG packet, (5) the URL parser, and (6) HTTP proxy connect. | Modified (20100819) | ACCEPT(5) Armstrong, Baker, Cole, Cox, Green | NOOP(2) Christey, Wall | Cox> Although the 0.59.1 version of Gaim shipped by Red Hat contained these | flaws, Yahoo connections were not functional and therefore the majority of | the issues could not be exploited, leading to the abstraction comment above. | Christey> CERT-VN:VU#871838 | URL:http://www.kb.cert.org/vuls/id/871838 | CERT-VN:VU#444158 | URL:http://www.kb.cert.org/vuls/id/444158 | CERT-VN:VU#503030 | URL:http://www.kb.cert.org/vuls/id/503030 | CERT-VN:VU#371382 | URL:http://www.kb.cert.org/vuls/id/371382 | CERT-VN:VU#297198 | URL:http://www.kb.cert.org/vuls/id/297198 | CERT-VN:VU#527142 | URL:http://www.kb.cert.org/vuls/id/527142 | Christey> Normalize Gentoo reference | View |
Page 432 of 20943, showing 5 records out of 104715 total, starting on record 2156, ending on 2160