CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3677 | CVE-2001-0871 | Candidate | Directory traversal vulnerability in HTTP server for Alchemy Eye and Alchemy Network Monitor allows remote attackers to execute arbitrary commands via an HTTP request containing (1) a .. in versions 2.0 through 2.6.18, or (2) a DOS device name followed by a .. in versions 2.6.19 through 3.0.10. | Modified (20050510) | NOOP(4) Armstrong, Cole, Foat, Wall | View | |
3454 | CVE-2001-0645 | Candidate | Symantec/AXENT NetProwler 3.5.x contains several default passwords, which could allow remote attackers to (1) access to the management tier via the "admin" password, or (2) connect to a MySQL ODBC from the management tier using a blank password. | Modified (20050510) | ACCEPT(5) Baker, Cole, Frech, Prosser, Ziese | NOOP(2) Foat, Wall | Prosser> Additional Reference | http://www.sarc.com/avcenter/security/Content/2001_05_08.html | Prosser> Add Symantec vendor advisory source | http://securityresponse.symantec.com/avcenter/security/Content/2001_05_08.html | View |
5247 | CVE-2002-0857 | Candidate | Format string vulnerabilities in Oracle Listener Control utility (lsnrctl) for Oracle 9.2 and 9.0, 8.1, and 7.3.4, allow remote attackers to execute arbitrary code on the Oracle DBA system by placing format strings into certain entries in the listener.ora configuration file. | Modified (20050510) | ACCEPT(4) Armstrong, Baker, Cole, Wall | MODIFY(1) Frech | NOOP(3) Christey, Cox, Foat | Christey> XF:oracle-lsnrctl-format-string(9832) | URL:http://www.iss.net/security_center/static/9832.php | CERT-VN:VU#301059 | URL:http://www.kb.cert.org/vuls/id/301059 | BID:5460 | URL:http://www.securityfocus.com/bid/5460 | MISC:http://www.nextgenss.com/advisories/ora-lsnrfmtstr.txt | Frech> XF:oracle-lsnrctl-format-string(9832) | View |
5508 | CVE-2002-1121 | Candidate | SMTP content filter engines, including (1) GFI MailSecurity for Exchange/SMTP before 7.2, (2) InterScan VirusWall before 3.52 build 1494, (3) the default configuration of MIMEDefang before 2.21, and possibly other products, do not detect fragmented emails as defined in RFC2046 ("Message Fragmentation and Reassembly") and supported in such products as Outlook Express, which allows remote attackers to bypass content filtering, including virus checking, via fragmented emails of the message/partial content type. | Modified (20050510) | ACCEPT(2) Baker, Cole | NOOP(2) Cox, Wall | View | |
5001 | CVE-2002-0610 | Candidate | Vulnerability in FTPSRVR in HP MPE/iX 6.0 through 7.0 does not properly validate certain FTP commands, which allows attackers to gain privileges. | Modified (20050510) | ACCEPT(3) Baker, Cole, Frech | NOOP(3) Cox, Foat, Wall | View |
Page 527 of 20943, showing 5 records out of 104715 total, starting on record 2631, ending on 2635