CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5851 | CVE-2002-1467 | Candidate | Macromedia Flash Plugin before 6,0,47,0 allows remote attackers to bypass the same-domain restriction and read arbitrary files via (1) an HTTP redirect, (2) a "file://" base in a web document, or (3) a relative URL from a web archive (mht file). | Proposed (20030317) | ACCEPT(3) Baker, Cole, Wall | NOOP(2) Christey, Cox | Christey> REDHAT:RHSA-2003:026 | View |
3385 | CVE-2001-0572 | Candidate | The SSH protocols 1 and 2 (aka SSH-2) as implemented in OpenSSH and other packages have various weaknesses which can allow a remote attacker to obtain the following information via sniffing: (1) password lengths or ranges of lengths, which simplifies brute force password guessing, (2) whether RSA or DSA authentication is being used, (3) the number of authorized_keys in RSA authentication, or (4) the lengths of shell commands. | Proposed (20010727) | ACCEPT(3) Baker, Cole, Williams | MODIFY(1) Frech | NOOP(4) Christey, Foat, Wall, Ziese | REVIEWING(1) Bishop | Frech> XF:ssh-plaintext-length-field(6783) | Christey> REDHAT:RHSA-2001:041 | (obsoletes REDHAT:RHSA-2001:033, according to Red Hat) | TURBO:TLSA2001021 | URL:http://www.turbolinux.com/pipermail/tl-security-announce/2001-May/000309.html | Christey> CISCO:20010627 Multiple SSH Vulnerabilities | http://www.cisco.com/warp/public/707/SSH-multiple-pub.html | View |
3083 | CVE-2001-0262 | Candidate | Buffer overflow in Netscape SmartDownload 1.3 allows remote attackers (malicious web pages) to execute arbitrary commands via a long URL. | Proposed (20010524) | ACCEPT(3) Baker, Cole, Williams | MODIFY(1) Frech | NOOP(4) Christey, Renaud, Wall, Ziese | Frech> XF:netscape-smartdownload-sdph20-bo(6403) | Christey> BUGTRAQ:20010418 Netscape SmartDownload 1.3 Buffer Overflow Vulnerability | URL:http://www.securityfocus.com/archive/1/177589 | Add sdph20.dll as affected component in description, as | indicated by above post. | Christey> Consider adding BID:2615 | View |
3255 | CVE-2001-0437 | Candidate | upload_file.pl in DCForum 2000 1.0 allows remote attackers to upload arbitrary files without authentication by setting the az parameter to upload_file. | Interim (20010911) | ACCEPT(3) Baker, Cole, Ziese | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:dcforum-az-file-upload(6393) | View |
2914 | CVE-2001-0093 | Candidate | Vulnerability in telnetd in FreeBSD 1.5 allows local users to gain root privileges by modifying critical environmental variables that affect the behavior of telnetd. | Proposed (20010202) | ACCEPT(3) Baker, Cole, Ziese | MODIFY(2) Frech, Prosser | NOOP(1) Wall | REVIEWING(1) Christey | Frech> XF:kerberos4-arbitrary-proxy(9733) | Description states FreeBSD, but advisory is for NetBSD. | Prosser> http://www.linuxsecurity.com/advisories/netbsd_advisory-1007.html | CHANGE> [Prosser changed vote from ACCEPT to MODIFY] | Prosser> The operating system in this CAN should also be NetBSD vice FreeBSD, same as in 0094. FreeBSD 3.5 STABLE and 4.2 STABLE are vulnerable as well. See ref | FreeBSD-SA-01:25 | http://www.linuxsecurity.com/advisories/freebsd_advisory-1153.html | or http://www.freebsd.org/security/security.html#adv | Christey> This description does not explicitly mention that the problem is | in a kerberized telnet. Need to verify that there aren"t | already other CVE"s that describe this. | View |
Page 944 of 20943, showing 5 records out of 104715 total, starting on record 4716, ending on 4720