CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4497 | CVE-2002-0103 | Candidate | An installer program for Oracle9iAS Web Cache 2.0.0.x creates executable and configuration files with insecure permissions, which allows local users to gain privileges by (1) running webcached or (2) obtaining the administrator password from webcache.xml. | Modified (20050706) | ACCEPT(5) Cole, Foat, Green, Wall, Ziese | MODIFY(1) Frech | Frech> XF:oracle-appserver-webcached-privileges(7766) | XF:oracle-appserver-webcache-password(7768) | CHANGE> [Foat changed vote from NOOP to ACCEPT] | View |
4850 | CVE-2002-0458 | Candidate | Cross-site scripting vulnerability in News-TNK 1.2.1 and earlier allows remote attackers to execute arbitrary Javascript via the WEB parameter. | Modified (20050706) | ACCEPT(4) Baker, Cole, Frech, Green | NOOP(3) Cox, Foat, Wall | View | |
3830 | CVE-2001-1026 | Candidate | Trend Micro InterScan AppletTrap 2.0 does not properly filter URLs when they are modified in certain ways such as (1) using a double slash (//) instead of a single slash, (2) URL-encoded characters, (3) requesting the IP address instead of the domain name, or (4) using a leading 0 in an octet of an IP address. | Modified (20050706) | ACCEPT(2) Cole, Frech | NOOP(4) Armstrong, Christey, Foat, Wall | REVIEWING(1) Green | Christey> Consider adding BID:2996 | Christey> Consider adding BID:2998 | Christey> Consider adding BID:2999 | Christey> Consider adding BID:3000 | Christey> fix typo: "leading a leading" | View |
4616 | CVE-2002-0224 | Candidate | The MSDTC (Microsoft Distributed Transaction Service Coordinator) for Microsoft Windows 2000, Microsoft IIS 5.0 and SQL Server 6.5 through SQL 2000 0.0 allows remote attackers to cause a denial of service (crash or hang) via malformed (random) input. | Modified (20050705) | ACCEPT(1) Green | NOOP(2) Cole, Foat | REVIEWING(1) Wall | View | |
4696 | CVE-2002-0304 | Candidate | Lil HTTP Server 2.1 allows remote attackers to read password-protected files via a /./ in the HTTP request. | Modified (20050705) | ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(4) Christey, Cox, Foat, Wall | Christey> VULNWATCH:20020222 [VulnWatch] SecurityOffice Security Advisories: Essentia and LilHTTP web servers | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0051.html | XF:lilhttp-protected-file-access(8247) | URL:http://www.iss.net/security_center/static/8247.php | BID:4153 | URL:http://www.securityfocus.com/bid/4153 | Frech> XF:lilhttp-protected-file-access(8247) | View |
Page 502 of 20943, showing 5 records out of 104715 total, starting on record 2506, ending on 2510