NVD List

Id Name Description Reject CVSS Version CVSS Score Severity Pub Date Modified Date Actions
73385  CVE-2003-0249  ** DISPUTED ** PHP treats unknown methods such as "PoSt" as a GET request, which could allow attackers to intended access restrictions if PHP is running on a server that passes on all methods, such as Apache httpd 2.0, as demonstrated using a Limit directive. NOTE: this issue has been disputed by the Apache security team, saying "It is by design that PHP allows scripts to process any request method. A script which does not explicitly verify the request method will hence be processed as normal for arbitrary methods. It is therefore expected behaviour that one cannot implement per-method access control using the Apache configuration alone, which is the assumption made in this report."    7.5  High  2017-01-03  2008-09-05  View
73641  CVE-2003-0514  Apple Safari allows remote attackers to bypass intended cookie access restrictions on a web application via "%2e%2e" (encoded dot dot) directory traversal sequences in a URL, which causes Safari to send the cookie outside the specified URL subsets, e.g. to a vulnerable application that runs on the same server as the target application.    7.5  High  2017-01-03  2008-09-05  View
74409  CVE-2003-1339  Stack-based buffer overflow in eZnet.exe, as used in eZ (a) eZphotoshare, (b) eZmeeting, (c) eZnetwork, and (d) eZshare allows remote attackers to cause a denial of service (crash) or execute arbitrary code, as demonstrated via (1) a long GET request and (2) a long operation or autologin parameter to SwEzModule.dll.    10  High  2017-01-03  2008-09-05  View
77481  CVE-2001-0001  cookiedecode function in PHP-Nuke 4.4 allows users to bypass authentication and gain access to other user accounts by extracting the authentication information from a cookie.    7.5  High  2017-01-05  2008-09-05  View
77737  CVE-2001-0259  ssh-keygen in ssh 1.2.27 - 1.2.30 with Secure-RPC can allow local attackers to recover a SUN-DES-1 magic phrase generated by another user, which the attacker can use to decrypt that user"s private key file.    3.6  Low  2017-01-05  2008-09-05  View

Page 1130 of 17672, showing 5 records out of 88360 total, starting on record 5646, ending on 5650

Actions