CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4636  CVE-2002-0244  Candidate  Directory traversal vulnerability in chroot function in AtheOS 0.3.7 allows attackers to escape the jail via a .. (dot dot) in the pathname argument to chdir.  Modified (20050528)  MODIFY(1) Frech | NOOP(5) Armstrong, Cole, Cox, Foat, Wall  Frech> XF:atheos-dot-directory-traversal(8108)  View
3645  CVE-2001-0839  Candidate  ibillpm.pl in iBill password management system generates weak passwords based on a client"s MASTER_ACCOUNT, which allows remote attackers to modify account information in the .htpasswd file via brute force password guessing.  Modified (20050528)  MODIFY(1) Frech | NOOP(5) Armstrong, Bishop, Cole, Foat, Wall  Frech> XF:ibillpm-cgi-insecure-password(7352)  View
5183  CVE-2002-0793  Candidate  Hard link and possibly symbolic link following vulnerabilities in QNX RTOS 4.25 (aka QNX4) allow local users to overwrite arbitrary files via (1) the -f argument to the monitor utility, (2) the -d argument to dumper, (3) the -c argument to crttrap, or (4) using the Watcom sample utility.  Modified (20050528)  NOOP(5) Armstrong, Cole, Cox, Foat, Wall    View
3655  CVE-2001-0849  Candidate  viralator CGI script in Viralator 0.9pre1 and earlier allows remote attackers to execute arbitrary code via a URL for a file being downloaded, which is insecurely passed to a call to wget.  Modified (20050528)  MODIFY(1) Frech | NOOP(5) Armstrong, Bishop, Cole, Foat, Wall  Frech> XF:viralator-cgi-command-execution(7440)  View
4431  CVE-2002-0037  Candidate  Lotus Domino Servers 5.x, 4.6x, and 4.5x allows attackers to bypass the intended Reader and Author access list for a document"s object via a Notes API call (NSFDbReadObject) that directly accesses the object.  Modified (20050528)  ACCEPT(3) Cole, Green, Wall | MODIFY(1) Frech | NOOP(4) Armstrong, Christey, Cox, Foat  Christey> Need to find some references for these... probably in | the CERT/CC vulnerability notes. | Frech> XF:lotus-domino-nsfdbreadobject(10095) | http://www.kb.cert.org/vuls/id/657899 | CONFIRM: | http://www-1.ibm.com/support/docview.wss?rs=1&org=sims&doc=CCA46CF459B | A6E4A85256AE3007C92C1 | Christey> Is this the same issue here? | BUGTRAQ:20011217 Lotus Notes: File attachments may be extracted regardless of document security | URL:http://archives.neohapsis.com/archives/bugtraq/2001-09/0147.html  View

Page 519 of 20943, showing 5 records out of 104715 total, starting on record 2591, ending on 2595

Actions