CVE List

Id CVE No. Status Description Phase Votes Comments Actions
5042  CVE-2002-0652  Candidate  xfsmd for IRIX 6.5 through 6.5.16 allows remote attackers to execute arbitrary code via shell metacharacters that are not properly filtered from several calls to the popen() function, such as export_fs().  Proposed (20020726)  ACCEPT(1) Baker | NOOP(5) Christey, Cole, Cox, Foat, Wall  Christey> XF:irix-xfsmd-execute-commands(9402) | URL:http://www.iss.net/security_center/static/9402.php | BID:5075 | URL:http://www.securityfocus.com/bid/5075  View
5070  CVE-2002-0680  Candidate  Directory traversal vulnerability in GoAhead Web Server 2.1 allows remote attackers to read arbitrary files via a URL with an encoded / (%5C) in a .. (dot dot) sequence. NOTE: it is highly likely that this candidate will be REJECTED because it has been reported to be a duplicate of CVE-2001-0228.  Proposed (20020726)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(5) Armstrong, Cole, Cox, Foat, Wall  Frech> XF:goahead-directory-traversal(6046)  View
5092  CVE-2002-0702  Candidate  Format string vulnerabilities in the logging routines for dynamic DNS code (print.c) of ISC DHCP daemon (DHCPD) 3 to 3.0.1rc8, with the NSUPDATE option enabled, allow remote malicious DNS servers to execute arbitrary code via format strings in a DNS server response.  Proposed (20020726)  ACCEPT(6) Armstrong, Baker, Cole, Cox, Foat, Wall    View
5107  CVE-2002-0717  Candidate  PHP 4.2.0 and 4.2.1 allows remote attackers to cause a denial of service and possibly execute arbitrary code via an HTTP POST request with certain arguments in a multipart/form-data form, which generates an error condition that is not properly handled and causes improper memory to be freed.  Proposed (20020726)  ACCEPT(5) Armstrong, Baker, Cole, Cox, Frech | NOOP(2) Christey, Foat | REVIEWING(1) Wall  Christey> BID:5278 | URL:http://www.securityfocus.com/bid/5278 | HP:HPSBUX0208-207 | URL:http://online.securityfocus.com/advisories/4362  View
4864  CVE-2002-0472  Candidate  MSN Messenger Service 3.6, and possibly other versions, uses weak authentication when exchanging messages between clients, which allows remote attackers to spoof messages from other users.  Proposed (20020611)  ACCEPT(2) Frech, Green | NOOP(3) Cole, Cox, Foat | REVIEWING(1) Wall    View

Page 88 of 20943, showing 5 records out of 104715 total, starting on record 436, ending on 440

Actions