CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
6903 | CVE-2003-0074 | Candidate | Format string vulnerability in mpmain.c for plpnfsd of the plptools package allows remote attackers to execute arbitrary code via the functions (1) debuglog, (2) errorlog, and (3) infolog. | Modified (20080326) | ACCEPT(3) Baker, Cole, Green | NOOP(2) Cox, Wall | View | |
6905 | CVE-2003-0076 | Candidate | Unknown vulnerability in the directory parser for Direct Connect 4 Linux (dcgui) before 0.2.2 allows remote attackers to read files outside the sharelist. | Proposed (20030317) | ACCEPT(3) Baker, Cole, Green | NOOP(2) Cox, Wall | View | |
5667 | CVE-2002-1283 | Candidate | Buffer overflow in Novell iManager (eMFrame) before 1.5 allows remote attackers to cause a denial of service via an authentication request with a long Distinguished Name (DN) attribute. | Modified (20081001) | ACCEPT(3) Baker, Cole, Green | NOOP(2) Cox, Wall | REVIEWING(1) Christey | Christey> Consider overlap with CVE-2002-1002 ? | See XF:novell-imanager-username-bo(9444) for more info | View |
4404 | CVE-2002-0010 | Candidate | Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges. | Modified (20050703) | ACCEPT(3) Baker, Cole, Green | NOOP(2) Foat, Wall | REVIEWING(1) Frech | Frech> XF:bugzilla-buglist-modify-sql(7807) | XF:bugzilla-userprefs-change-groupset(7809) | XF:bugzilla-longlist-modify-sql(7811) | XF:bugzilla-editusers-change-groupset(7814) | XF:bugzilla-buglist-sql-logic(7813) | View |
5705 | CVE-2002-1321 | Candidate | Multiple buffer overflows in RealOne and RealPlayer allow remote attackers to execute arbitrary code via (1) a Synchronized Multimedia Integration Language (SMIL) file with a long parameter, (2) a long long filename in a rtsp:// request, e.g. from a .m3u file, or (3) certain "Now Playing" options on a downloaded file with a long filename. | Modified (20050708) | ACCEPT(3) Baker, Cole, Green | NOOP(3) Christey, Cox, Wall | Christey> fix typo: "long long" | View |
Page 935 of 20943, showing 5 records out of 104715 total, starting on record 4671, ending on 4675