CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3146 | CVE-2001-0325 | Candidate | Buffer overflow in QNX RTP 5.60 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a large number of arguments to the stat command. | Proposed (20010404) | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | REVIEWING(1) Bishop | Frech> XF:qnx-rtp-ftpd-bo(6442) | View |
3147 | CVE-2001-0326 | Entry | Oracle Java Virtual Machine (JVM ) for Oracle 8.1.7 and Oracle Application Server 9iAS Release 1.0.2.0.1 allows remote attackers to read arbitrary files via the .jsp and .sqljsp file extensions when the server is configured to use the <<ALL FILES>> FilePermission. | View | |||
3148 | CVE-2001-0327 | Entry | iPlanet Web Server Enterprise Edition 4.1 and earlier allows remote attackers to retrieve sensitive data from memory allocation pools, or cause a denial of service, via a URL-encoded Host: header in the HTTP request, which reveals memory in the Location: header that is returned by the server. | View | |||
3149 | CVE-2001-0328 | Candidate | TCP implementations that use random increments for initial sequence numbers (ISN) can allow remote attackers to perform session hijacking or disruption by injecting a flood of packets with a range of ISN values, one of which may match the expected ISN. | Modified (20161125) | ACCEPT(7) Baker, Cole, Magdych, Renaud, Wall, Williams, Ziese | MODIFY(1) Frech | REVIEWING(1) Christey | Frech> XF:tcp-seq-predict(139) | Christey> It could be argued that this is a "class" of vulnerability in which | several stacks have the problem. | Also need to add references. | Christey> Consider adding BID:2682 | Christey> HP:HPSBUX0207-205 | URL:http://archives.neohapsis.com/archives/hp/2002-q3/0031.html | Christey> COMPAQ:SSRT-547 | URL:http://archives.neohapsis.com/archives/tru64/2002-q3/0017.html | HP:HPSBUX0207-205 | URL:http://archives.neohapsis.com/archives/hp/2002-q3/0031.html | View |
3150 | CVE-2001-0329 | Candidate | Bugzilla 2.10 allows remote attackers to execute arbitrary commands via shell metacharacters in a username that is then processed by (1) the Bugzilla_login cookie in post_bug.cgi, or (2) the who parameter in process_bug.cgi. | Modified (20011130) | ACCEPT(4) Baker, Cole, Renaud, Williams | MODIFY(1) Frech | NOOP(2) Wall, Ziese | RECAST(1) Christey | Christey> CONFIRM:http://www.mozilla.org/projects/bugzilla/security2_12.html | Frech> XF:bugzilla-email-shell-characters(6488) | CHANGE> [Christey changed vote from NOOP to RECAST] | Christey> This needs to be MERGED with CVE-2000-0421. | CVE-2000-0421 documents a problem in the "who" parameter of | the process_bug.cgi program. This is a duplicate of one of the | problems being identified by CVE-2001-0329. The other problem | in CVE-2001-0329, the Bugzilla_login cookie, is fixed in | the same version as the who problem is. CD:SF-EXEC | suggests merging multiple executables in the same package | that have the same problem that is present in the same version. | Both the "who" and "Bugzilla_login" problems were fixed in | version 2.12. Therefore CVE-2000-0421 and CVE-2001-0329 | need to be MERGED. | | CHANGEREF BID:1199 | View |
Page 630 of 20943, showing 5 records out of 104715 total, starting on record 3146, ending on 3150