CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3635  CVE-2001-0829  Candidate  A cross-site scripting vulnerability in Apache Tomcat 3.2.1 allows a malicious webmaster to embed Javascript in a request for a .JSP file, which causes the Javascript to be inserted into an error message.  Proposed (20011122)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(6) Armstrong, Bishop, Christey, Cole, Foat, Wall  Frech> XF:java-servlet-crosssite-scripting(6793) | Christey> CERT-VN:VU#672683 | URL:http://www.kb.cert.org/vuls/id/672683  View
5202  CVE-2002-0812  Candidate  Information leak in Compaq WL310, and the Orinoco Residential Gateway access point it is based on, uses a system identification string as a default SNMP read/write community string, which allows remote attackers to obtain and modify sensitive configuration information by querying for the identification string.  Modified (20040725)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall  Christey> VULNWATCH:20020813 Foundstone Labs Advisory - Information Leakage in Orinoco and Compaq Access Points [updated] | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q3/0075.html | XF:orinoco-rg-default-snmp(9810) | URL:http://www.iss.net/security_center/static/9810.php | BID:5436 | URL:http://www.securityfocus.com/bid/5436 | Frech> XF:orinoco-rg-default-snmp(9810)  View
4752  CVE-2002-0360  Candidate  Buffer overflow in Sun AnswerBook2 1.4 through 1.4.3 allows remote attackers to execute arbitrary code via a long filename argument to the gettransbitmap CGI program.  Modified (20040725)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall  Christey> XF:sun-answerbook2-gettransbitmap-bo(9117) | URL:http://www.iss.net/security_center/static/9117.php | BID:4784 | URL:http://www.securityfocus.com/bid/4784 | Frech> XF:sun-answerbook2-gettransbitmap-bo(9117)  View
5027  CVE-2002-0637  Candidate  InterScan VirusWall 3.52 build 1462 allows remote attackers to bypass virus protection via e-mail messages with headers that violate RFC specifications by having (or missing) space characters in unexpected places (aka "space gap"), such as (1) Content-Type :", (2) "Content-Transfer-Encoding :", (3) no space before a boundary declaration, or (4) "boundary= ", which is processed by Outlook Express.  Modified (20071101)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall  Christey> BID:5259 | URL:http://online.securityfocus.com/bid/5259 | CONFIRM:http://solutionbank.antivirus.com/solutions/solutionDetail.asp?solutionId=11948 | | According to Axel Pettinger, Solaris 3.7 build 1070 | is affected by the "boundary space (trailing)" and "Boundary | Space (prefix)" problems, but not the content-type or transfer | encoding issues. That version clearly has some overlap with | this issue, but since a different build and version number are | affected, perhaps a separate candidate needs to be created. | More information on that issue is at: | http://solutionbank.antivirus.com/solutions/solutiondetail.asp?solutionID=12142 | | Baker> http://solutionbank.antivirus.com/solutions/solutionDetail.asp?solutionID=11948 | Frech> XF:interscan-viruswall-protection-bypass(9464)  View
5071  CVE-2002-0681  Candidate  Cross-site scripting vulnerability in GoAhead Web Server 2.1 allows remote attackers to execute script as other web users via script in a URL that generates a "404 not found" message, which does not quote the script.  Modified (20040725)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall  Christey> XF:goahead-error-msg-xss(9518) | URL:http://www.iss.net/security_center/static/9518.php | BID:5198 | URL:http://www.securityfocus.com/bid/5198 | Christey> XF:goahead-encoded-directory-traversal(9519) | URL:http://www.iss.net/security_center/static/9519.php | BID:5197 | URL:http://www.securityfocus.com/bid/5197 | Frech> XF:goahead-error-msg-xss(9518)  View

Page 632 of 20943, showing 5 records out of 104715 total, starting on record 3156, ending on 3160

Actions