CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3731 | CVE-2001-0925 | Candidate | The default installation of Apache before 1.3.19 allows remote attackers to list directories instead of the multiview index.html file via an HTTP request for a path that contains many / (slash) characters, which causes the path to be mishandled by (1) mod_negotiation, (2) mod_dir, or (3) mod_autoindex. | Proposed (20020131) | ACCEPT(5) Armstrong, Baker, Cole, Foat, Green | NOOP(2) Christey, Wall | REJECT(1) Frech | Frech> I"m using both candidates until we decide if it is a dupe, | and then which | candidate to deprecate. | Christey> BUGTRAQ:20010615 TSLSA-2001-0010 - Apache | URL:http://archives.neohapsis.com/archives/bugtraq/2001-06/0180.html | Christey> CVE-2001-0925 and CVE-2001-0729 are different issues. | CVE-2001-0925 only applies to versions before 1.3.19, whereas | CVE-2001-0729 applies to 1.3.20, and only Windows. | | The Change Log at http://www.apache.org/dist/httpd/CHANGES_1.3 | specifically mentions these CANs separately. | View |
3732 | CVE-2001-0926 | Candidate | SSIFilter in Allaire JRun 3.1, 3.0 and 2.3.3 allows remote attackers to obtain source code for Java server pages (.jsp) and other files in the web root via an HTTP request for a non-existent SSI page, in which the request"s body has an #include statement. | Proposed (20020131) | ACCEPT(2) Baker, Frech | NOOP(4) Armstrong, Cole, Foat, Wall | View | |
3733 | CVE-2001-0927 | Candidate | Format string vulnerability in the permitted function of GNOME libgtop_daemon in libgtop 1.0.12 and earlier allows remote attackers to execute arbitrary code via an argument that contains format specifiers that are passed into the (1) syslog_message and (2) syslog_io_message functions. | Modified (20050309) | ACCEPT(3) Armstrong, Baker, Cole | MODIFY(1) Frech | NOOP(3) Christey, Foat, Wall | Frech> XF:libgtop-format-string(7608) | Christey> BID:3586 | URL:http://www.securityfocus.com/bid/3586 | CONECTIVA:CLA-2002:448 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000448 | MANDRAKE:MDKSA-2001:094 | URL:http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-094.php3 | DEBIAN:DSA-098 | URL:http://www.debian.org/security/2002/dsa-098 | View |
3734 | CVE-2001-0928 | Candidate | Buffer overflow in the permitted function of GNOME gtop daemon (libgtop_daemon) in libgtop 1.0.13 and earlier may allow remote attackers to execute arbitrary code via long authentication data. | Modified (20050511) | ACCEPT(2) Baker, Foat | MODIFY(1) Frech | NOOP(4) Armstrong, Christey, Cole, Wall | Frech> XF:XF:libgtop-permitted-bo(7635) | CONFIRM:MandrakeSoft Security Advisory MDKSA-2001:094, | "libgtop", | http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-094.php3 | CONFIRM:Debian Security Advisory DSA-098-1, "libgtop: format string | vulnerability and buffer overflow", | http://www.debian.org/security/2002/dsa-098 | Christey> BID:3594 | URL:http://www.securityfocus.com/bid/3594 | CONECTIVA:CLA-2002:448 | URL:http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000448 | MANDRAKE:MDKSA-2001:094 | URL:http://www.linux-mandrake.com/en/security/2001/MDKSA-2001-094.php3 | DEBIAN:DSA-098 | URL:http://www.debian.org/security/2002/dsa-098 | Christey> DEBIAN:DSA-301 | URL:http://www.debian.org/security/2003/dsa-301 | View |
3735 | CVE-2001-0929 | Entry | Cisco IOS Firewall Feature set, aka Context Based Access Control (CBAC) or Cisco Secure Integrated Software, for IOS 11.2P through 12.2T does not properly check the IP protocol type, which could allow remote attackers to bypass access control lists. | View |
Page 747 of 20943, showing 5 records out of 104715 total, starting on record 3731, ending on 3735