CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3998 | CVE-2001-1194 | Candidate | Zyxel Prestige 681 and 1600 SDSL Routers allow remote attackers to cause a denial of service via malformed packets with (1) an IP length less than actual packet size, or (2) fragmented packets whose size exceeds 64 kilobytes after reassembly. | Modified (20050702) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Cole, Foat, Wall, Ziese | RECAST(1) Christey | Christey> This should probably be SPLIT. The 2 vulnerabilities, while | both related to malformed input, are clearly different types | of malformed input. | XF:prestige-dsl-frag-packet-dos(7723) | URL:http://xforce.iss.net/static/7723.php | XF:prestige-dsl-frag-packet-dos(7723) | URL:http://xforce.iss.net/static/7723.php | BID:3711 | URL:http://www.securityfocus.com/bid/3711 | Frech> XF:prestige-dsl-packet-length-dos(7704) | View |
3914 | CVE-2001-1110 | Candidate | EFTP 2.0.7.337 allows remote attackers to obtain NETBIOS credentials by requesting information on a file that is in a network share, which causes the server to send the credentials to the host that owns the share, and allows the attacker to sniff the connection. | Proposed (20020315) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(5) Armstrong, Cole, Foat, Wall, Ziese | Frech> XF:eftp-list-directory-traversal(7113) | In description, NETBIOS should be NetBIOS. | View |
3961 | CVE-2001-1157 | Candidate | Baltimore Technologies WEBsweeper 4.0 and 4.02 does not properly filter Javascript from HTML pages, which could allow remote attackers to bypass the filtering via (1) an extra leading < and one or more characters before the SCRIPT tag, or (2) tags using Unicode. | Proposed (20020315) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(5) Armstrong, Cole, Foat, Wall, Ziese | Frech> XF:content-script-bypass-filtering(6580) | XF:content-unicode-bypass-script(6980) | View |
3972 | CVE-2001-1168 | Candidate | Directory traversal vulnerability in index.php in PhpMyExplorer before 1.2.1 allows remote attackers to read arbitrary files via a ..%2F (modified dot dot) in the chemin parameter. | Proposed (20020315) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(5) Armstrong, Cole, Foat, Wall, Ziese | Frech> XF:phpmyexplorer-dot-directory-traversal(7049) | View |
3995 | CVE-2001-1191 | Candidate | WebSeal in IBM Tivoli SecureWay Policy Director 3.8 allows remote attackers to cause a denial of service (crash) via a URL that ends in %2e. | Proposed (20020315) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(5) Christey, Cole, Foat, Wall, Ziese | Frech> XF:tivoli-webseal-dos(7716) | http://online.securityfocus.com/archive/1/268124 | Christey> BUGTRAQ:20020417 IBM Security Advisory: IBM Tivoli Policy Director WebSEAL | URL:http://archives.neohapsis.com/archives/bugtraq/2002-04/0223.html | | The vendor says that "there is no denial of service | vulnerability" but goes on to describe "a defect related to | the use of SSL junctions between the WebSEAL component and Web | Servers. This defect can cause the WebSEAL component to fail if SSL | junctions are being used, and certain URLs are then passed across | these junctions." This still sounds like a DoS to me, albeit | one that might not appear in all configurations. | | Fix capitalization: "WebSEAL" | View |
Page 729 of 20943, showing 5 records out of 104715 total, starting on record 3641, ending on 3645