CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
9002 | CVE-2004-0574 | Candidate | The Network News Transfer Protocol (NNTP) component of Microsoft Windows NT Server 4.0, Windows 2000 Server, Windows Server 2003, Exchange 2000 Server, and Exchange Server 2003 allows remote attackers to execute arbitrary code via XPAT patterns, possibly related to improper length validation and an "unchecked buffer," leading to off-by-one and heap-based buffer overflows. | Assigned (20040615) | None (candidate not yet proposed) | View | |
9003 | CVE-2004-0575 | Candidate | Integer overflow in DUNZIP32.DLL for Microsoft Windows XP, Windows XP 64-bit Edition, Windows Server 2003, and Windows Server 2003 64-bit Edition allows remote attackers to execute arbitrary code via compressed (zipped) folders that involve an "unchecked buffer" and improper length validation. | Assigned (20040615) | None (candidate not yet proposed) | View | |
9004 | CVE-2004-0576 | Candidate | The radius daemon (radiusd) for GNU Radius 1.1, when compiled with the -enable-snmp option, allows remote attackers to cause a denial of service (server crash) via malformed SNMP messages containing an invalid OID. | Assigned (20040617) | None (candidate not yet proposed) | View | |
9005 | CVE-2004-0577 | Candidate | WinGate 5.2.3 build 901 and 6.0 beta 2 build 942, and other versions such as 5.0.5, allows remote attackers to read arbitrary files from the root directory via a URL request to the wingate-internal directory. | Assigned (20040617) | None (candidate not yet proposed) | View | |
9006 | CVE-2004-0578 | Candidate | WinGate 5.2.3 build 901 and 6.0 beta 2 build 942, and other versions such as 5.0.5, allows remote attackers to read arbitrary files via leading slash (//) characters in a URL request to the wingate-internal directory. | Assigned (20040617) | None (candidate not yet proposed) | View |
Page 889 of 20943, showing 5 records out of 104715 total, starting on record 4441, ending on 4445