CVE List

Id CVE No. Status Description Phase Votes Comments Actions
5869  CVE-2002-1485  Candidate  The AIM component of Trillian 0.73 and 0.74 allows remote attackers to cause a denial of service (crash) via certain strings such as "P > O < C".  Modified (20050602)  NOOP(5) Armstrong, Baker, Cole, Cox, Wall    View
5675  CVE-2002-1291  Candidate  The Microsoft Java implementation, as used in Internet Explorer, allows remote attackers to read arbitrary local files and network shares via an applet tag with a codebase set to a "file://%00" (null character) URL.  Modified (20050601)  ACCEPT(2) Baker, Green | NOOP(2) Cole, Cox | REVIEWING(1) Wall    View
5678  CVE-2002-1294  Candidate  The Microsoft Java implementation, as used in Internet Explorer, can provide HTML object references to applets via Javascript, which allows remote attackers to cause a denial of service (crash due to illegal memory accesses) and possibly conduct other unauthorized activities via an applet that uses those references to access proprietary Microsoft methods.  Modified (20050601)  ACCEPT(2) Baker, Green | NOOP(2) Cole, Cox | REVIEWING(1) Wall    View
5770  CVE-2002-1386  Candidate  Buffer overflow in traceroute-nanog (aka traceroute-ng) may allow local users to execute arbitrary code via a long hostname argument.  Modified (20050601)  ACCEPT(1) Baker | NOOP(4) Christey, Cole, Cox, Wall | REVIEWING(1) Green  Christey> DEBIAN:DSA-254 | BID:6274 | SUSE:SuSE-SA:2002:043  View
5276  CVE-2002-0886  Candidate  Cisco DSL CPE devices running CBOS 2.4.4 and earlier allows remote attackers to cause a denial of service (hang or memory consumption) via (1) a large packet to the DHCP port, (2) a large packet to the Telnet port, or (3) a flood of large packets to the CPE, which causes the TCP/IP stack to consume large amounts of memory.  Modified (20050601)  ACCEPT(5) Alderson, Armstrong, Baker, Cole, Frech | NOOP(2) Cox, Foat | RECAST(1) Jones  Jones> A single large packet DoS to a listening service (which sounds | like a buffer overflow) seems like a different vulnerability than multiple | large packets (which is admittedly resource consumption). Suggest SPLIT | into two items, prolems 1 and 2 in A, and problem 3 in B.  View

Page 516 of 20943, showing 5 records out of 104715 total, starting on record 2576, ending on 2580

Actions