CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4008  CVE-2001-1204  Candidate  Directory traversal vulnerability in phprocketaddin in Total PC Solutions PHP Rocket Add-in for FrontPage 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the page parameter.  Modified (20050705)  MODIFY(1) Frech | NOOP(5) Cole, Foat, Green, Wall, Ziese  Frech> XF:phprocket-directory-traversal(7749)  View
3522  CVE-2001-0714  Candidate  Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to cause a denial of service (data loss) by (1) setting a high initial message hop count option (-h), which causes Sendmail to drop queue entries, (2) via the -qR option, or (3) via the -qS option.  Modified (20050704)  ACCEPT(6) Armstrong, Baker, Cole, Foat, Prosser, Wall | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:sendmail-queue-dos(7190) | Christey> ADDREF SGI:20011101-01-I | Christey> CALDERA:CSSA-2001-034.0 | URL:http://www.calderasystems.com/support/security/advisories/CSSA-2001-034.0.txt | BID:3378 | URL:http://www.securityfocus.com/bid/3378 | CIAC:M-020 | URL:http://ciac.llnl.gov/ciac/bulletins/m-020.shtml  View
3523  CVE-2001-0715  Candidate  Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to obtain potentially sensitive information about the mail queue by setting debugging flags to enable debug mode.  Modified (20050704)  ACCEPT(5) Armstrong, Baker, Cole, Foat, Wall | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:sendmail-debug-gain-information(7191) | Christey> ADDREF SGI:20011101-01-I | Christey> CIAC:M-020 | URL:http://ciac.llnl.gov/ciac/bulletins/m-020.shtml | HP:HPSBUX0201-179 | URL:http://www.securityfocus.com/advisories/3794 | BID:3898 | URL:http://www.securityfocus.com/bid/3898 | It *might* be that HP:HPSBUX0201-179 addresses this, but the | advisory is too vague to be certain. | URL:http://www.securityfocus.com/advisories/3794  View
4610  CVE-2002-0218  Candidate  Format string vulnerability in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via format specifiers in a command line argument.  Modified (20050703)  ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall    View
4611  CVE-2002-0219  Candidate  Buffer overflow in (1) sastcpd in SAS/Base 8.0 and 8.1 or (2) objspawn in SAS/Integration Technologies 8.0 and 8.1 allows local users to execute arbitrary code via large command line argument.  Modified (20050703)  ACCEPT(2) Cole, Green | NOOP(2) Foat, Wall    View

Page 503 of 20943, showing 5 records out of 104715 total, starting on record 2511, ending on 2515

Actions