CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3177  CVE-2001-0357  Candidate  FormMail.pl in FormMail 1.6 and earlier allows a remote attacker to send anonymous email (spam) by modifying the recipient and message parameters.  Modified (20060526)  ACCEPT(2) Baker, Frech | NOOP(6) Bishop, Christey, Cole, Foat, Wall, Ziese | REVIEWING(1) Williams  Baker> http://www.securityfocus.com/archive/1/168177 | http://www.securityfocus.com/archive/1/168292 | http://www.securityfocus.com/archive/1/168366 | http://www.securityfocus.com/archive/1/168345 | http://www.securityfocus.com/archive/1/168302 | http://www.securityfocus.com/archive/1/168360 | http://www.securityfocus.com/archive/1/168633 | | I think from the discussion on the Bugtraq list, there is sufficient verfication that this | is a real problem, and well-known. There are a couple of work arounds | described in the posts, so this should be accepted. | Christey> Fix typo: "paramaters" | Christey> Fix typo: "paramater" | Christey> The following references discuss this problem and/or later | variants of it, up to version 1.9. | MISC:http://www.softwolves.pp.se/misc/formmail_hall_of_shame | MISC:http://www.monkeys.com/anti-spam/formmail-advisory.pdf | MISC:http://www.scriptarchive.com/readme/formmail.html  View
4423  CVE-2002-0029  Candidate  Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684.  Modified (20060523)  ACCEPT(3) Baker, Cole, Frech | MODIFY(1) Cox | NOOP(2) Christey, Wall  CHANGE> [Cox changed vote from REVIEWING to MODIFY] | Cox> ADDREF: REDHAT: http://rhn.redhat.com/cve/CVE-2002-0029.html | Christey> the redhat reference is REDHAT:RHSA-2004:383  View
3605  CVE-2001-0799  Candidate  Buffer overflows in lpsched in IRIX 6.5.13f and earlier allow remote attackers to execute arbitrary commands via a long argument.  Modified (20060508)  ACCEPT(5) Armstrong, Baker, Bishop, Cole, Foat | MODIFY(1) Frech | NOOP(1) Wall  Frech> XF;irix-lpsched-bo(7641)  View
2280  CVE-2000-0704  Candidate  Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.  Modified (20060505)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Frech> XF:irix-worldview-wnn-bo | Christey> XF:irix-worldview-wnn-bo | http://xforce.iss.net/static/5163.php  View
1212  CVE-1999-1232  Candidate  Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program.  Modified (20060503)  ACCEPT(1) Frech | NOOP(2) Cole, Foat    View

Page 490 of 20943, showing 5 records out of 104715 total, starting on record 2446, ending on 2450

Actions