CVE List

Id CVE No. Status Description Phase Votes Comments Actions
9523  CVE-2004-1095  Candidate  Multiple integer overflows in (1) readbmp.c, (2) readgif.c, (3) readgif.c, (4) readmrf.c, (5) readpcx.c, (6) readpng.c,(7) readpnm.c, (8) readprf.c, (9) readtiff.c, (10) readxbm.c, (11) readxpm.c in zgv 5.8 allow remote attackers to execute arbitrary code via certain image headers that cause calculations to be overflowed and small buffers to be allocated, leading to buffer overflows. NOTE: CVE-2004-0994 and CVE-2004-1095 identify sets of bugs that only partially overlap, despite having the same developer. Therefore, they should be regarded as distinct.  Assigned (20041130)  None (candidate not yet proposed)    View
9524  CVE-2004-1096  Candidate  Archive::Zip Perl module before 1.14, when used by antivirus programs such as amavisd-new, allows remote attackers to bypass antivirus protection via a compressed file with both local and global headers set to zero, which does not prevent the compressed file from being opened on a target system.  Assigned (20041130)  None (candidate not yet proposed)    View
9525  CVE-2004-1097  Candidate  Format string vulnerability in the cherokee_logger_ncsa_write_string function in Cherokee 0.4.17 and earlier, when authenticating via auth_pam, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via format string specifiers in the URL.  Assigned (20041130)  None (candidate not yet proposed)    View
9526  CVE-2004-1098  Candidate  MIMEDefang in MIME-tools 5.414 allows remote attackers to bypass virus scanning capabilities via an e-mail attachment with a virus that contains an empty boundary string in the Content-Type header.  Assigned (20041130)  None (candidate not yet proposed)    View
9527  CVE-2004-1099  Candidate  Cisco Secure Access Control Server for Windows (ACS Windows) and Cisco Secure Access Control Server Solution Engine (ACS Solution Engine) 3.3.1, when the EAP-TLS protocol is enabled, does not properly handle expired or untrusted certificates, which allows remote attackers to bypass authentication and gain unauthorized access via a "cryptographically correct" certificate with valid fields such as the username.  Assigned (20041130)  None (candidate not yet proposed)    View

Page 995 of 20943, showing 5 records out of 104715 total, starting on record 4971, ending on 4975

Actions