CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3150  CVE-2001-0329  Candidate  Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi.  Modified (20011130)  ACCEPT(4) Baker, Cole, Renaud, Williams | MODIFY(1) Frech | NOOP(2) Wall, Ziese | RECAST(1) Christey  Christey> CONFIRM:http://www.mozilla.org/projects/bugzilla/security2_12.html | Frech> XF:bugzilla-email-shell-characters(6488) | CHANGE> [Christey changed vote from NOOP to RECAST] | Christey> This needs to be MERGED with CVE-2000-0421. | CVE-2000-0421 documents a problem in the "who" parameter of | the process_bug.cgi program. This is a duplicate of one of the | problems being identified by CVE-2001-0329. The other problem | in CVE-2001-0329, the Bugzilla_login cookie, is fixed in | the same version as the who problem is. CD:SF-EXEC | suggests merging multiple executables in the same package | that have the same problem that is present in the same version. | Both the "who" and "Bugzilla_login" problems were fixed in | version 2.12. Therefore CVE-2000-0421 and CVE-2001-0329 | need to be MERGED. | | CHANGEREF BID:1199  View
1512  CVE-1999-1532  Candidate  Netscape Messaging Server 3.54, 3.55, and 3.6 allows a remote attacker to cause a denial of service (memory exhaustion) via a series of long RCPT TO commands.  Modified (20011126-01)  MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall  Frech> XF:netscape-messaging-rcptto-dos(8340) | Description ends with a comma and not a period, possibly | indicating that the sentence is not complete,  View
1805  CVE-2000-0227  Candidate  The Linux 2.2.x kernel does not restrict the number of Unix domain sockets as defined by the wmem_max paremeter, which allows local users to cause a denial of service by requesting a large number of sockets.  Modified (20010910-01)  ACCEPT(8) Armstrong, Baker, Blake, Cole, Collins, Frech, Levy, Ozancin | NOOP(3) Christey, Magdych, Wall  Christey> Fix typo: "paremeter" | Magdych> I remember when this came up... seems like there were some wildly | mixed results for the exploit. | Christey> See http://marc.theaimsgroup.com/?l=bugtraq&m=95421263519558&w=2 | for Elias" summary of the mixed results. It looks like | enough people were able to replicate it that we should | include it. | Christey> Fix typo: "paremeter" | CHANGE> [Magdych changed vote from REVIEWING to NOOP]  View
2401  CVE-2000-0832  Candidate  Htgrep CGI program allows remote attackers to read arbitrary files by specifying the full pathname in the hdr parameter.  Modified (20010910-01)  ACCEPT(2) Baker, Collins | MODIFY(1) Frech | NOOP(4) Armstrong, Christey, Cole, Wall  Frech> XF:htgrep-cgi-view-files(5476) | Collins> http://www.iam.unibe.ch/~scg/Src/Doc/ | Christey> The change log for htgrep acknowledges the problem, but it | says that the qry tag is also affected. CD:SF-LOC says that | multiple problems of the same type in the same version should | be combined, so this candidate should get a "soft recast" | and qry should be added to the description.  View
3190  CVE-2001-0372  Candidate  Akopia Interchange 4.5.3 through 4.6.3 installs demo stores with a default group account :backup with no password, which allows a remote attacker to gain administrative access via the demo stores (1) barry, (2) basic, or (3) construct.  Modified (20010910-01)  ACCEPT(4) Baker, Cole, Frech, Ziese | NOOP(2) Oliver, Wall    View

Page 559 of 20943, showing 5 records out of 104715 total, starting on record 2791, ending on 2795

Actions