CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3441 | CVE-2001-0628 | Entry | Microsoft Word 2000 does not check AutoRecovery (.asd) files for macros, which allows a local attacker to execute arbitrary macros with the user ID of the Word user. | View | |||
3442 | CVE-2001-0629 | Entry | HP Event Correlation Service (ecsd) as included with OpenView Network Node Manager 6.1 allows a remote attacker to gain addition privileges via a buffer overflow attack in the "-restore_config" command line parameter. | View | |||
3443 | CVE-2001-0630 | Entry | Directory traversal vulnerability in MIMAnet viewsrc.cgi 2.0 allows a remote attacker to read arbitrary files via a ".." (dot dot) attack in the "loc" variable. | View | |||
3444 | CVE-2001-0631 | Entry | Centrinity First Class Internet Services 5.50 allows for the circumventing of the default "spam" filters via the presence of "<@>" in the "From:" field, which allows remote attackers to send spoofed email with the identity of local users. | View | |||
3445 | CVE-2001-0632 | Candidate | Sun Chili!Soft 3.5.2 on Linux and 3.6 on AIX creates a default admin username and password in the default installation, which can allow a remote attacker to gain additional privileges. | Proposed (20010727) | ACCEPT(6) Baker, Bishop, Cole, Prosser, Williams, Ziese | MODIFY(1) Frech | NOOP(2) Foat, Wall | Frech> XF: chilisoft-asp-unauthorized-access(6957) | CHANGE> [Williams changed vote from ACCEPT to MODIFY] | Williams> there are actually several issues here, not just the one mentioned in our description. need to modify. | CHANGE> [Williams changed vote from MODIFY to ACCEPT] | Williams> NM my comments. just saw the other CANs. :/ | Prosser> | Vendor Response to issue: | Re: Advisory: Chili!Soft ASP Multiple Vulnerabilities | http://www.securityfocus.com/archive/1/20010224172142.1888.qmail@securityfocus.com | View |
Page 689 of 20943, showing 5 records out of 104715 total, starting on record 3441, ending on 3445