CVE List

Id CVE No. Status Description Phase Votes Comments Actions
4693  CVE-2002-0301  Candidate  Citrix NFuse 1.6 allows remote attackers to bypass authentication and obtain sensitive information by directly calling launch.asp with invalid NFUSE_USER and NFUSE_PASSWORD parameters.  Proposed (20020502)  ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(4) Christey, Cox, Foat, Wall  Christey> XF:nfuse-user-information-disclosure(8257) | URL:http://www.iss.net/security_center/static/8257.php | Frech> XF:nfuse-user-information-disclosure(8257)  View
4696  CVE-2002-0304  Candidate  Lil HTTP Server 2.1 allows remote attackers to read password-protected files via a /./ in the HTTP request.  Modified (20050705)  ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(4) Christey, Cox, Foat, Wall  Christey> VULNWATCH:20020222 [VulnWatch] SecurityOffice Security Advisories: Essentia and LilHTTP web servers | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q1/0051.html | XF:lilhttp-protected-file-access(8247) | URL:http://www.iss.net/security_center/static/8247.php | BID:4153 | URL:http://www.securityfocus.com/bid/4153 | Frech> XF:lilhttp-protected-file-access(8247)  View
4969  CVE-2002-0578  Candidate  Buffer overflow in 4D WebServer 6.7.3 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP request with Basic Authentication containing a long (1) user name or (2) password.  Proposed (20020611)  ACCEPT(1) Cole | MODIFY(1) Frech | NOOP(5) Armstrong, Christey, Cox, Foat, Wall  Frech> XF:4d-webserver-authentication-bo(8996) | Christey> A very similar issue was reported in the same version: | BUGTRAQ:20020618 4D 6.7 DOS and Buffer Overflow Vulnerability | URL:http://online.securityfocus.com/archive/1/277481 | | That issue is being given a separate CAN, but it may in fact | be a "dupe" of this issue, or at least it may need to be | merged per CD:SF-LOC.  View
2695  CVE-2000-1128  Candidate  The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:Program Files directory.  Proposed (20001219)  ACCEPT(1) Cole | MODIFY(1) Frech | REVIEWING(1) Wall  Frech> XF:nai-virusscan-unquoted-imagepath(5484)  View
3239  CVE-2001-0421  Candidate  FTP server in Solaris 8 and earlier allows local and remote attackers to cause a core dump in the root directory, possibly with world-readable permissions, by providing a valid username with an invalid password followed by a CWD ~ command, which could release sensitive information such as shadowed passwords, or fill the disk partition.  Proposed (20010524)  ACCEPT(1) Cole | MODIFY(2) Dik, Frech | NOOP(1) Wall | REVIEWING(2) Williams, Ziese  Frech> XF:solaris-ftp-shadow-recovery(6422) | Dik> sun bug ids: 4436988 | | The "world-readable" core dump problem does not exist in | Solaris 8 and other Solaris releases which have been patched | to include the "coreadm" command and possibly earlier (many release | have been patched to avoid core dumps in more situations and | always make them mode 0600) | | Solaris 8 was the first release to contain coreadm initially | (backported and include in 2.6 & 7) | Solaris 7 was the first release to make core dumps mode 0600. | (fix backported to 2.6 and earlier)  View

Page 654 of 20943, showing 5 records out of 104715 total, starting on record 3266, ending on 3270

Actions