CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
4892 | CVE-2002-0500 | Candidate | Internet Explorer 5.0 through 6.0 allows remote attackers to determine the existence of files on the client via an IMG tag with a dynsrc property that references the target file, which sets certain elements of the image object such as file size. | Proposed (20020611) | ACCEPT(2) Cole, Frech | NOOP(3) Armstrong, Cox, Foat | REVIEWING(1) Wall | View | |
4899 | CVE-2002-0507 | Candidate | An interaction between Microsoft Outlook Web Access (OWA) with RSA SecurID allows local users to bypass the SecurID authentication for a previous user via several submissions of an OWA Authentication request with the proper OWA password for the previous user, which is eventually accepted by OWA. | Proposed (20020611) | ACCEPT(2) Cole, Frech | NOOP(3) Armstrong, Cox, Foat | REVIEWING(1) Wall | View | |
3846 | CVE-2001-1042 | Candidate | Transsoft Broker 5.9.5.0 allows remote attackers to read arbitrary files and directories by uploading a .lnk (link) file that points to the target file. | Proposed (20020131) | ACCEPT(2) Cole, Frech | NOOP(3) Armstrong, Foat, Wall | REVIEWING(1) Green | View | |
3078 | CVE-2001-0257 | Candidate | Buffer overflow in Easycom/Safecom Print Server Web service, version 404.590 and earlier, allows remote attackers to execute arbitrary commands via (1) a long URL or (2) a long HTTP header field such as "Host:". | Proposed (20010404) | ACCEPT(2) Cole, Frech | NOOP(3) Bishop, Wall, Ziese | View | |
1134 | CVE-1999-1154 | Candidate | LakeWeb Filemail CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address. | Proposed (20010912) | ACCEPT(2) Cole, Frech | NOOP(3) Christey, Foat, Wall | Christey> I confirmed this problem via visual inspection of the | source code in http://www.lakeweb.com/scripts/filemail.zip | Line 82 has an insufficient check for shell metacharacters | that doesn"t exclude semicolons. Line 129 is the | call where the metacharacters are injected. | | Need to add "filemail.pl" to the description. | View |
Page 827 of 20943, showing 5 records out of 104715 total, starting on record 4131, ending on 4135