CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5471 | CVE-2002-1084 | Candidate | The VerifyLogin function in ezContents 1.41 and earlier does not properly halt program execution if a user fails to log in properly, which allows remote attackers to modify and view restricted information via HTTP POST requests. | Proposed (20020830) | ACCEPT(1) Foat | NOOP(3) Cole, Cox, Wall | View | |
5474 | CVE-2002-1087 | Candidate | The scripts (1) createdir.php, (2) removedir.php and (3) uploadfile.php for ezContents 1.41 and earlier do not check credentials, which allows remote attackers to create or delete directories and upload files via a direct HTTP POST request. | Proposed (20020830) | ACCEPT(1) Foat | NOOP(3) Cole, Cox, Wall | View | |
5282 | CVE-2002-0893 | Candidate | Directory traversal vulnerability in NewAtlanta ServletExec ISAPI 4.1 allows remote attackers to read arbitrary files via a URL-encoded request to com.newatlanta.servletexec.JSP10Servlet containing "..%5c" (modified dot-dot) sequences. | Proposed (20020830) | ACCEPT(1) Frech | MODIFY(1) Jones | NOOP(5) Alderson, Armstrong, Cole, Cox, Foat | Jones> Suggest: "... via a URL-encoded request to | /servlet/com.newatlanta.servletexec.JSP10Servlet/ containing sequences like | "..%5c" (modified dot-dot)." | View |
5283 | CVE-2002-0894 | Candidate | NewAtlanta ServletExec ISAPI 4.1 allows remote attackers to cause a denial of service (crash) via (1) a request for a long .jsp file, or (2) a long URL sent directly to com.newatlanta.servletexec.JSP10Servlet. | Proposed (20020830) | ACCEPT(1) Frech | MODIFY(1) Jones | NOOP(5) Alderson, Armstrong, Cole, Cox, Foat | Jones> Suggest: "... via (1) a request for a long-named .jsp file, or (2) | a long string sent directly to | /servlet/com.newatlanta.servletexec.JSP10Servlet/ or | /servlet/com.newatlanta.servletexec.JSPServlet/." | View |
3431 | CVE-2001-0618 | Candidate | Orinoco RG-1000 wireless Residential Gateway uses the last 5 digits of the "Network Name" or SSID as the default Wired Equivalent Privacy (WEP) encryption key. Since the SSID occurs in the clear during communications, a remote attacker could determine the WEP key and decrypt RG-1000 traffic. | Proposed (20010727) | ACCEPT(1) Frech | MODIFY(1) Ziese | NOOP(3) Cole, Foat, Wall | REVIEWING(1) Bishop | Ziese> vulnerability, per se, then why is this? If WEP is delievred enabled, by | any vendor, it must give the existing/default WEP-key somewhere. Will every | hardware product be flawed by his definition? | View |
Page 671 of 20943, showing 5 records out of 104715 total, starting on record 3351, ending on 3355