CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3216 | CVE-2001-0398 | Candidate | The BAT! mail client allows remote attackers to bypass user warnings of an executable attachment and execute arbitrary commands via an attachment whose file name contains many spaces, which also causes the BAT! to misrepresent the attachment"s type with a different icon. | Proposed (20010524) | ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(3) Christey, Wall, Ziese | Frech> XF:thebat-masked-file-type(6324) | Christey> Add affected version: 1.51 was reported in the original post. | View |
3217 | CVE-2001-0399 | Candidate | Caucho Resin 1.3b1 and earlier allows remote attackers to read source code for Javabean files by inserting a .jsp before the WEB-INF specifier in an HTTP request. | Proposed (20010524) | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | Frech> XF:resin-view-javabean(6320) | View |
3218 | CVE-2001-0400 | Candidate | nph-maillist.pl allows remote attackers to execute arbitrary commands via shell metacharacters ("`") in the email address. | Proposed (20010524) | ACCEPT(1) Williams | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | Frech> XF:nph-maillist-execute-code(6363) | View |
3219 | CVE-2001-0401 | Candidate | Buffer overflow in tip in Solaris 8 and earlier allows local users to execute arbitrary commands via a long HOME environmental variable. | Modified (20090716) | ACCEPT(2) Dik, Frech | NOOP(3) Cole, Wall, Ziese | Dik> sun bug: 4330475 | View |
3220 | CVE-2001-0402 | Entry | IPFilter 3.4.16 and earlier does not include sufficient session information in its cache, which allows remote attackers to bypass access restrictions by sending fragmented packets to a restricted port after sending unfragmented packets to an unrestricted port. | View |
Page 644 of 20943, showing 5 records out of 104715 total, starting on record 3216, ending on 3220