CVE List

Id CVE No. Status Description Phase Votes Comments Actions
6925  CVE-2003-0096  Candidate  Multiple buffer overflows in Oracle 9i Database release 2, Release 1, 8i, 8.1.7, and 8.0.6 allow remote attackers to execute arbitrary code via (1) a long conversion string argument to the TO_TIMESTAMP_TZ function, (2) a long time zone argument to the TZ_OFFSET function, or (3) a long DIRECTORY parameter to the BFILENAME function.  Modified (20071016)  ACCEPT(4) Baker, Cole, Frech, Wall | NOOP(2) Christey, Cox  Christey> Modify the description to omit 8.0.6, as the Oracle advisory | does not list it. (However, NGSSoftware does, perhaps as the | result of a typo or cut-and-paste error in their advisory). | | CIAC:N-046 | URL:http://www.ciac.org/ciac/bulletins/n-046.shtml | BID:6850 | URL:http://www.securityfocus.com/bid/6850 | BID:6847 | URL:http://www.securityfocus.com/bid/6847 | BID:6848 | URL:http://www.securityfocus.com/bid/6848 | MISC:http://www.nextgenss.com/advisories/ora-bfilebo.txt | MISC:http://www.nextgenss.com/advisories/ora-tzofstbo.txt | MISC:http://www.nextgenss.com/advisories/ora-tmstmpbo.txt  View
6927  CVE-2003-0098  Candidate  Unknown vulnerability in apcupsd before 3.8.6, and 3.10.x before 3.10.5, allows remote attackers to gain root privileges, possibly via format strings in a request to a slave server.  Modified (20071016)  ACCEPT(4) Armstrong, Cole, Green, Jones | NOOP(2) Christey, Cox  Christey> SUSE:SuSE-SA:2003:022 | CALDERA:CSSA-2003-015.0 | Christey> DEBIAN:DSA-277 | URL:http://www.debian.org/security/2003/dsa-277 | Christey> CHANGEREF BID:6828 | (BID:7200 is for the overflows)  View
6928  CVE-2003-0099  Candidate  Multiple buffer overflows in apcupsd before 3.8.6, and 3.10.x before 3.10.5, may allow attackers to cause a denial of service or execute arbitrary code, related to usage of the vsprintf function.  Modified (20071016)  ACCEPT(4) Armstrong, Cole, Green, Jones | NOOP(2) Christey, Cox  Christey> SUSE:SuSE-SA:2003:022 | CALDERA:CSSA-2003-015.0 | Christey> DEBIAN:DSA-277 | URL:http://www.debian.org/security/2003/dsa-277 | Christey> As observed in an email to us by a third party, it appears | that 3.8.6 is probably not affected by this, so the | description should be changed to refer to "3.10.x before | 3.10.5, and 3.8.x before 3.8.6". | Christey> An email from Kern Sibbald on August 21, 2003, confirmed that | 3.8.6 and 3.10.5 fixed the issue. | | CONFIRM:http://sourceforge.net/project/shownotes.php?release_id=137892  View
5910  CVE-2002-1526  Candidate  Cross-site scripting (XSS) vulnerability in emumail.cgi for EMU Webmail 5.0 allows remote attackers to inject arbitrary HTML or script via the email address field.  Modified (20071016)  ACCEPT(2) Armstrong, Baker | NOOP(4) Christey, Cole, Cox, Wall  Christey> XF:emu-webmail-address-xss(10205) | URL:http://www.iss.net/security_center/static/10205.php  View
5911  CVE-2002-1527  Candidate  emumail.cgi in EMU Webmail 5.0 allows remote attackers to determine the full pathname for emumail.cgi via a malformed string containing script, which generates a regular expression matching error that includes the pathname in the resulting error message.  Modified (20071016)  ACCEPT(2) Armstrong, Baker | NOOP(3) Cole, Cox, Wall    View

Page 471 of 20943, showing 5 records out of 104715 total, starting on record 2351, ending on 2355

Actions