CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3381 | CVE-2001-0568 | Candidate | Digital Creations Zope 2.3.1 b1 and earlier allows a local attacker (Zope user) with through-the-web scripting capabilities to alter ZClasses class attributes. | Proposed (20010727) | ACCEPT(5) Baker, Bishop, Cole, Williams, Ziese | MODIFY(1) Frech | NOOP(2) Foat, Wall | Frech> XF:zope-zclass-modification(6247) | View |
3382 | CVE-2001-0569 | Candidate | Digital Creations Zope 2.3.1 b1 and earlier contains a problem in the method return values related to the classes (1) ObjectManager, (2) PropertyManager, and (3) PropertySheet. | Proposed (20010727) | ACCEPT(4) Baker, Cole, Williams, Ziese | MODIFY(2) Bishop, Frech | NOOP(2) Foat, Wall | Bishop> the description is too vague; please specify the result of | the problem | Frech> XF:zope-classes-return-value(6952) | View |
3383 | CVE-2001-0570 | Candidate | minicom 1.83.1 and earlier allows a local attacker to gain additional privileges via numerous format string attacks. | Proposed (20010727) | ACCEPT(4) Cole, Frech, Prosser, Wall | NOOP(2) Foat, Ziese | REVIEWING(1) Bishop | View | |
3384 | CVE-2001-0571 | Candidate | Directory traversal vulnerability in the web server for (1) Elron Internet Manager (IM) Message Inspector and (2) Anti-Virus before 3.0.4 allows remote attackers to read arbitrary files via a .. (dot dot) in the requested URL. | Proposed (20010727) | ACCEPT(5) Baker, Bishop, Cole, Wall, Ziese | MODIFY(1) Frech | NOOP(1) Foat | REVIEWING(1) Williams | Frech> XF:elronim-antivirus-directory-traversal(6959) | XF:elronim-inspector-directory-traversal(6960) | CONFIRM:http://www.elronsw.com/connection/story194a.html | View |
3385 | CVE-2001-0572 | Candidate | The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands. | Proposed (20010727) | ACCEPT(3) Baker, Cole, Williams | MODIFY(1) Frech | NOOP(4) Christey, Foat, Wall, Ziese | REVIEWING(1) Bishop | Frech> XF:ssh-plaintext-length-field(6783) | Christey> REDHAT:RHSA-2001:041 | (obsoletes REDHAT:RHSA-2001:033, according to Red Hat) | TURBO:TLSA2001021 | URL:http://www.turbolinux.com/pipermail/tl-security-announce/2001-May/000309.html | Christey> CISCO:20010627 Multiple SSH Vulnerabilities | http://www.cisco.com/warp/public/707/SSH-multiple-pub.html | View |
Page 677 of 20943, showing 5 records out of 104715 total, starting on record 3381, ending on 3385