CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-2001-1577
|
Unknown vulnerability in CDE in Caldera OpenUnix 7.1.0, 7.1.1, and 8.0 allows an xterm session to gain privileges when the session is reused.
|
['gain privileges', 'gain privileges when the session is reused', 'unknown']
|
CVE-2001-1578
|
Unknown vulnerability in SCO OpenServer 5.0.6 and earlier allows local users to modify critical information such as certain CPU registers and segment descriptors.
|
['modify critical information such as certain CPU registers', 'unknown']
|
CVE-2001-1579
|
The timed program (in.timed) in UnixWare 7 and OpenUnix 8.0.0 does not properly terminate certain strings with a null, which allows remote attackers to cause a denial of service.
|
['cause a denial of service']
|
CVE-2001-1580
|
Directory traversal vulnerability in ScriptEase viewcode.jse for Netware 5.1 before 5.1 SP3 allows remote attackers to read arbitrary files via ".." sequences in the query string.
|
['read arbitrary files', 'read arbitrary files via ".." sequences', 'directory traversal']
|
CVE-2001-1581
|
The File Blocker feature in Clearswift MAILsweeper for SMTP 4.2 allows remote attackers to bypass e-mail attachment filtering policies via a modified name in a Content-Type header.
|
['bypass e-mail attachment filtering', 'bypass e-mail attachment filtering policies via', 'modified name']
|
CVE-2001-1582
|
Buffer overflow in the LDAP naming services library (libsldap) in Sun Solaris 8 allows local users to execute arbitrary code via a long LDAP_OPTIONS environment variable to a privileged program that uses libsldap.
|
['execute arbitrary code', 'execute arbitrary code via a long LDAP_OPTIONS environment', 'buffer overflow']
|
CVE-2001-1583
|
lpd daemon (in.lpd) in Solaris 8 and earlier allows remote attackers to execute arbitrary commands via a job request with a crafted control file that is not properly handled when lpd invokes a mail program. NOTE: this might be the same vulnerability as CVE-2000-1220.
|
['execute arbitrary commands', 'execute arbitrary commands via a job request with']
|
CVE-2001-1584
|
CardBoard 2.4 greeting card CGI by Michael Barretto allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient field.
|
['execute arbitrary commands', 'execute arbitrary commands via shell metacharacters in the']
|
CVE-2001-1585
|
SSH protocol 2 (aka SSH-2) public key authentication in the development snapshot of OpenSSH 2.3.1, available from 2001-01-18 through 2001-02-08, does not perform a challenge-response step to ensure that the client has the proper private key, which allows remote attackers to bypass authentication as other users by supplying a public key from that user's authorized_keys file.
|
['bypass authentication', 'bypass authentication as other users by supplying a']
|
CVE-2001-1586
|
Directory traversal vulnerability in SimpleServer:WWW 1.13 and earlier allows remote attackers to execute arbitrary programs via encoded ../ ("%2E%2E%2F%") sequences in a request to the cgi-bin/ directory, a different vulnerability than CVE-2000-0664.
|
['execute arbitrary programs', 'execute arbitrary programs via encoded ../ (', 'directory traversal']
|
CVE-2001-1587
|
NWFTPD.nlm before 5.01w in the FTP server in Novell NetWare allows remote attackers to cause a denial of service (abend) via an anonymous STOU command.
|
['denial of service (abend)', 'cause a denial of service (abend)', 'anonymous stou command']
|
CVE-2001-1593
|
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
|
['modify arbitrary files', 'modify arbitrary files via a symlink attack on']
|
CVE-2001-1594
|
GE Healthcare eNTEGRA P&R has a password of (1) entegra for the entegra user, (2) passme for the super user of the Polestar/Polestar-i Starlink 4 upgrade, (3) 0 for the entegra user of the Codonics printer FTP service, (4) eNTEGRA for the eNTEGRA P&R user account, (5) insite for the WinVNC Login, and possibly other accounts, which has unspecified impact and attack vectors. NOTE: it is not clear whether this password is default, hardcoded, or dependent on another system or product that requires a fixed value.
|
['unspecified impact', 'hardcoded']
|
CVE-2002-0001
|
Vulnerability in RFC822 address parser in mutt before 1.2.5.1 and mutt 1.3.x before 1.3.25 allows remote attackers to execute arbitrary commands via an improperly terminated comment or phrase in the address list.
|
['execute arbitrary commands', 'execute arbitrary commands via an improperly terminated comment']
|
CVE-2002-0002
|
Format string vulnerability in stunnel before 3.22 when used in client mode for (1) smtp, (2) pop, or (3) nntp allows remote malicious servers to execute arbitrary code.
|
['execute arbitrary code', 'format string']
|
CVE-2002-0003
|
Buffer overflow in the preprocessor in groff 1.16 and earlier allows remote attackers to gain privileges via lpd in the LPRng printing system.
|
['gain privileges', 'gain privileges via lpd in the LPRng printing', 'buffer overflow']
|
CVE-2002-0004
|
Heap corruption vulnerability in the "at" program allows local users to execute arbitrary code via a malformed execution time, which causes at to free the same memory twice.
|
['execute arbitrary code', 'execute arbitrary code via a malformed execution time', 'heap corruption', 'free the same memory twice']
|
CVE-2002-0005
|
Buffer overflow in AOL Instant Messenger (AIM) 4.7.2480, 4.8.2616, and other versions allows remote attackers to execute arbitrary code via a long argument in a game request (AddGame).
|
['execute arbitrary code', 'execute arbitrary code via a long argument in', 'buffer overflow']
|
CVE-2002-0006
|
XChat 1.8.7 and earlier, including default configurations of 1.4.2 and 1.4.3, allows remote attackers to execute arbitrary IRC commands as other clients via encoded characters in a PRIVMSG command that calls CTCP PING, which expands the characters in the client response when the percascii variable is set.
|
['execute arbitrary IRC commands', 'execute arbitrary IRC commands as other clients via']
|
CVE-2002-0007
|
CGI.pl in Bugzilla before 2.14.1, when using LDAP, allows remote attackers to obtain an anonymous bind to the LDAP server via a request that does not include a password, which causes a null password to be sent to the LDAP server.
|
['obtain an anonymous bind to the LDAP server', 'null password']
|
CVE-2002-0008
|
Bugzilla before 2.14.1 allows remote attackers to (1) spoof a user comment via an HTTP request to process_bug.cgi using the "who" parameter, instead of the Bugzilla_login cookie, or (2) post a bug as another user by modifying the reporter parameter to enter_bug.cgi, which is passed to post_bug.cgi.
|
['(1) spoof a user comment via', 'spoofing']
|
CVE-2002-0009
|
show_bug.cgi in Bugzilla before 2.14.1 allows a user with "Bugs Access" privileges to see other products that are not accessible to the user, by submitting a bug and reading the resulting Product pulldown menu.
|
['see other products that are not accessible to']
|
CVE-2002-0010
|
Bugzilla before 2.14.1 allows remote attackers to inject arbitrary SQL code and create files or gain privileges via (1) the sql parameter in buglist.cgi, (2) invalid field names from the "boolean chart" query in buglist.cgi, (3) the mybugslink parameter in userprefs.cgi, (4) a malformed bug ID in the buglist parameter in long_list.cgi, and (5) the value parameter in editusers.cgi, which allows groupset privileges to be modified by attackers with blessgroupset privileges.
|
['inject arbitrary SQL code', 'gain privileges', 'inject arbitrary SQL code and create files or', 'be modified by attackers with blessgroupset privileges', 'arbitrary sql code', 'invalid field names', 'malformed bug id']
|
CVE-2002-0011
|
Information leak in doeditvotes.cgi in Bugzilla before 2.14.1 may allow remote attackers to more easily conduct attacks on the login.
|
['more easily conduct attacks on the login', 'information leak']
|
CVE-2002-0012
|
Vulnerabilities in a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via SNMPv1 trap handling, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.
|
['gain privileges', 'cause a denial of service or gain privileges', 'trap handling']
|
CVE-2002-0013
|
Vulnerabilities in the SNMPv1 request handling of a large number of SNMP implementations allow remote attackers to cause a denial of service or gain privileges via (1) GetRequest, (2) GetNextRequest, and (3) SetRequest messages, as demonstrated by the PROTOS c06-SNMPv1 test suite. NOTE: It is highly likely that this candidate will be SPLIT into multiple candidates, one or more for each vendor. This and other SNMP-related candidates will be updated when more accurate information is available.
|
['gain privileges', 'cause a denial of service or gain privileges']
|
CVE-2002-0014
|
URL-handling code in Pine 4.43 and earlier allows remote attackers to execute arbitrary commands via a URL enclosed in single quotes and containing shell metacharacters (&).
|
['execute arbitrary commands', 'execute arbitrary commands via a URL enclosed in', 'shell metacharacters']
|
CVE-2002-0017
|
Buffer overflow in SNMP daemon (snmpd) on SGI IRIX 6.5 through 6.5.15m allows remote attackers to execute arbitrary code via an SNMP request.
|
['execute arbitrary code', 'execute arbitrary code via an SNMP request', 'buffer overflow']
|
CVE-2002-0018
|
In Microsoft Windows NT and Windows 2000, a trusting domain that receives authorization information from a trusted domain does not verify that the trusted domain is authoritative for all listed SIDs, which allows remote attackers to gain Domain Administrator privileges on the trusting domain by injecting SIDs from untrusted domains into the authorization data that comes from from the trusted domain.
|
['gain Domain Administrator privileges', 'gain Domain Administrator privileges on the trusting domain']
|
CVE-2002-0020
|
Buffer overflow in telnet server in Windows 2000 and Interix 2.2 allows remote attackers to execute arbitrary code via malformed protocol options.
|
['execute arbitrary code', 'execute arbitrary code via malformed protocol options', 'buffer overflow']
|
CVE-2002-0021
|
Network Product Identification (PID) Checker in Microsoft Office v. X for Mac allows remote attackers to cause a denial of service (crash) via a malformed product announcement.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'malformed product announcement']
|
CVE-2002-0022
|
Buffer overflow in the implementation of an HTML directive in mshtml.dll in Internet Explorer 5.5 and 6.0 allows remote attackers to execute arbitrary code via a web page that specifies embedded ActiveX controls in a way that causes 2 Unicode strings to be concatenated.
|
['execute arbitrary code', 'execute arbitrary code via a web page that', 'buffer overflow']
|
CVE-2002-0023
|
Internet Explorer 5.01, 5.5 and 6.0 allows remote attackers to read arbitrary files via malformed requests to the GetObject function, which bypass some of GetObject's security checks.
|
['read arbitrary files', "bypass some of GetObject's security checks", 'read arbitrary files via malformed requests to the']
|
CVE-2002-0024
|
File Download box in Internet Explorer 5.01, 5.5 and 6.0 allows an attacker to use the Content-Disposition and Content-Type HTML header fields to modify how the name of the file is displayed, which could trick a user into believing that a file is safe to download.
|
['use the Content-Disposition and Content-']
|
CVE-2002-0025
|
Internet Explorer 5.01, 5.5 and 6.0 does not properly handle the Content-Type HTML header field, which allows remote attackers to modify which application is used to process a document.
|
['modify which application is used to process a']
|
CVE-2002-0026
|
Internet Explorer 5.5 and 6.0 allows remote attackers to bypass restrictions for executing scripts via an object that processes asynchronous events after the initial security checks have been made.
|
['bypass restrictions', 'bypass restrictions for executing scripts via an object']
|
CVE-2002-0027
|
Internet Explorer 5.5 and 6.0 allows remote attackers to read certain files and spoof the URL in the address bar by using the Document.open function to pass information between two frames from different domains, a new variant of the "Frame Domain Verification" vulnerability described in MS:MS01-058/CAN-2001-0874.
|
['read certain files and spoof the URL in', 'frame domain verification', 'spoofing']
|
CVE-2002-0028
|
Buffer overflow in ICQ before 2001B Beta v5.18 Build #3659 allows remote attackers to execute arbitrary code via a Voice Video & Games request.
|
['execute arbitrary code', 'execute arbitrary code via a Voice Video &', 'buffer overflow']
|
CVE-2002-0029
|
Buffer overflows in the DNS stub resolver library in ISC BIND 4.9.2 through 4.9.10, and other derived libraries such as BSD libc and GNU glibc, allow remote attackers to execute arbitrary code via DNS server responses that trigger the overflow in the (1) getnetbyname, or (2) getnetbyaddr functions, aka "LIBRESOLV: buffer overrun" and a different vulnerability than CVE-2002-0684.
|
['execute arbitrary code', 'execute arbitrary code via DNS server responses that', 'buffer overflows', 'buffer overrun']
|
CVE-2002-0030
|
The digital signature mechanism for the Adobe Acrobat PDF viewer only verifies the PE header of executable code for a plug-in, which can allow attackers to execute arbitrary code in certified mode by making the plug-in appear to be signed by Adobe.
|
['execute arbitrary code', 'execute arbitrary code in certified mode by making']
|
CVE-2002-0031
|
Buffer overflows in Yahoo! Messenger 5,0,0,1064 and earlier allows remote attackers to execute arbitrary code via a ymsgr URI with long arguments to (1) call, (2) sendim, (3) getimv, (4) chat, (5) addview, or (6) addfriend.
|
['execute arbitrary code', 'execute arbitrary code via a ymsgr URI with', 'buffer overflows']
|
CVE-2002-0032
|
Yahoo! Messenger 5,0,0,1064 and earlier allows remote attackers to execute arbitrary script as other users via the addview parameter of a ymsgr URI.
|
['execute arbitrary script', 'execute arbitrary script as other users via the', 'addview parameter']
|
CVE-2002-0033
|
Heap-based buffer overflow in cfsd_calloc function of Solaris cachefsd allows remote attackers to execute arbitrary code via a request with a long directory and cache name.
|
['execute arbitrary code', 'execute arbitrary code via a request with a', 'heap-based buffer overflow', 'heap based buffer overflow']
|
CVE-2002-0034
|
The Microsoft CONVERT.EXE program, when used on Windows 2000 and Windows XP systems, does not apply the default NTFS permissions when converting a FAT32 file system, which could cause the conversion to produce a file system with less secure permissions than expected.
|
['less secure permissions']
|
CVE-2002-0036
|
Integer signedness error in MIT Kerberos V5 ASN.1 decoder before krb5 1.2.5 allows remote attackers to cause a denial of service via a large unsigned data element length, which is later used as a negative value.
|
['cause a denial of service via a large', 'integer signedness error']
|
CVE-2002-0037
|
Lotus Domino Servers 5.x, 4.6x, and 4.5x allows attackers to bypass the intended Reader and Author access list for a document's object via a Notes API call (NSFDbReadObject) that directly accesses the object.
|
['bypass the intended Reader and Author access list']
|
CVE-2002-0038
|
Vulnerability in the cache-limiting function of the unified name service daemon (nsd) in IRIX 6.5.4 through 6.5.11 allows remote attackers to cause a denial of service by forcing the cache to fill the disk.
|
['cause a denial of service by forcing the']
|
CVE-2002-0039
|
rpcbind in SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, allows remote attackers to cause a denial of service (crash) via malformed RPC packets with invalid lengths.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'invalid lengths']
|
CVE-2002-0040
|
Vulnerability in SGI IRIX 6.5.11 through 6.5.15f allows local users to cause privileged applications to dump core via the HOSTALIASES environment variable, which might allow the users to gain privileges.
|
['gain privileges', 'cause privileged applications to dump core via the']
|
CVE-2002-0041
|
Unknown vulnerability in Mail for SGI IRIX 6.5 through 6.5.15f, and possibly earlier versions, when running with the -R option, allows local and remote attackers to cause a core dump.
|
['cause a core dump', 'unknown']
|
CVE-2002-0042
|
Vulnerability in the XFS file system for SGI IRIX before 6.5.12 allows local users to cause a denial of service (hang) by creating a file that is not properly processed by XFS.
|
['denial of service (hang)', 'cause a denial of service (hang)']
|
CVE-2002-0043
|
sudo 1.6.0 through 1.6.3p7 does not properly clear the environment before calling the mail program, which could allow local users to gain root privileges by modifying environment variables and changing how the mail program is invoked.
|
['gain root privileges', 'gain root privileges by modifying environment variables and']
|
CVE-2002-0044
|
GNU Enscript 1.6.1 and earlier allows local users to overwrite arbitrary files of the Enscript user via a symlink attack on temporary files.
|
['overwrite arbitrary files', 'overwrite arbitrary files of the Enscript user via', 'symlink']
|
CVE-2002-0045
|
slapd in OpenLDAP 2.0 through 2.0.19 allows local users, and anonymous users before 2.0.8, to conduct a "replace" action on access controls without any values, which causes OpenLDAP to delete non-mandatory attributes that would otherwise be protected by ACLs.
|
['conduct a "replace" action on access', 'delete non-mandatory attributes']
|
CVE-2002-0046
|
Linux kernel, and possibly other operating systems, allows remote attackers to read portions of memory via a series of fragmented ICMP packets that generate an ICMP TTL Exceeded response, which includes portions of the memory in the response packet.
|
['read portions of memory via a series of']
|
CVE-2002-0047
|
CIPE VPN package before 1.3.0-3 allows remote attackers to cause a denial of service (crash) via a short malformed packet.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'malformed packet']
|
CVE-2002-0048
|
Multiple signedness errors (mixed signed and unsigned numbers) in the I/O functions of rsync 2.4.6, 2.3.2, and other versions allow remote attackers to cause a denial of service and execute arbitrary code in the rsync client or server.
|
['execute arbitrary code', 'cause a denial of service and execute arbitrary', 'multiple signedness errors']
|
CVE-2002-0049
|
Microsoft Exchange Server 2000 System Attendant gives "Everyone" group privileges to the WinReg key, which could allow remote attackers to read or modify registry keys.
|
['read or modify registry keys', 'winreg key']
|
CVE-2002-0050
|
Buffer overflow in AuthFilter ISAPI filter on Microsoft Commerce Server 2000 allows remote attackers to execute arbitrary code via long authentication data.
|
['execute arbitrary code', 'execute arbitrary code via long authentication data', 'buffer overflow']
|
CVE-2002-0051
|
Windows 2000 allows local users to prevent the application of new group policy settings by opening Group Policy files with exclusive-read access.
|
['prevent the application of new group policy settings', 'exclusive-read access']
|
CVE-2002-0052
|
Internet Explorer 6.0 and earlier does not properly handle VBScript in certain domain security checks, which allows remote attackers to read arbitrary files.
|
['read arbitrary files']
|
CVE-2002-0053
|
Buffer overflow in SNMP agent service in Windows 95/98/98SE, Windows NT 4.0, Windows 2000, and Windows XP allows remote attackers to cause a denial of service or execute arbitrary code via a malformed management request. NOTE: this candidate may be split or merged with other candidates. This and other PROTOS-related candidates, especially CVE-2002-0012 and CVE-2002-0013, will be updated when more accurate information is available.
|
['execute arbitrary code', 'cause a denial of service or execute arbitrary', 'buffer overflow']
|
CVE-2002-0054
|
SMTP service in (1) Microsoft Windows 2000 and (2) Internet Mail Connector (IMC) in Exchange Server 5.5 does not properly handle responses to NTLM authentication, which allows remote attackers to perform mail relaying via an SMTP AUTH command using null session credentials.
|
['perform mail relaying via an SMTP AUTH command', 'null session credentials']
|
CVE-2002-0055
|
SMTP service in Microsoft Windows 2000, Windows XP Professional, and Exchange 2000 allows remote attackers to cause a denial of service via a command with a malformed data transfer (BDAT) request.
|
['cause a denial of service via a command', 'malformed data transfer (bdat) request']
|
CVE-2002-0056
|
Buffer overflow in SQL Server 7.0 and 2000 allows remote attackers to execute arbitrary code via a long OLE DB provider name to (1) OpenDataSource or (2) OpenRowset in an ad hoc connection.
|
['execute arbitrary code', 'execute arbitrary code via a long OLE DB', 'buffer overflow']
|
CVE-2002-0057
|
XMLHTTP control in Microsoft XML Core Services 2.6 and later does not properly handle IE Security Zone settings, which allows remote attackers to read arbitrary files by specifying a local file as an XML Data Source.
|
['read arbitrary files', 'read arbitrary files by specifying a local file']
|
CVE-2002-0058
|
Vulnerability in Java Runtime Environment (JRE) allows remote malicious web sites to hijack or sniff a web client's sessions, when an HTTP proxy is being used, via a Java applet that redirects the session to another server, as seen in (1) Netscape 6.0 through 6.1 and 4.79 and earlier, (2) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, and possibly other implementations that use vulnerable versions of SDK or JDK.
|
["hijack or sniff a web client's sessions", 'vulnerability in java runtime environment (jre)']
|
CVE-2002-0059
|
The decompression algorithm in zlib 1.1.3 and earlier, as used in many different utilities and packages, causes inflateEnd to release certain memory more than once (a "double free"), which may allow local and remote attackers to execute arbitrary code via a block of malformed compression data.
|
['execute arbitrary code', 'execute arbitrary code via a block of malformed', 'double free', 'malformed compression data']
|
CVE-2002-0060
|
IRC connection tracking helper module in the netfilter subsystem for Linux 2.4.18-pre9 and earlier does not properly set the mask for conntrack expectations for incoming DCC connections, which could allow remote attackers to bypass intended firewall restrictions.
|
['bypass intended firewall restrictions']
|
CVE-2002-0061
|
Apache for Win32 before 1.3.24, and 2.0.x before 2.0.34-beta, allows remote attackers to execute arbitrary commands via shell metacharacters (a | pipe character) provided as arguments to batch (.bat) or .cmd scripts, which are sent unfiltered to the shell interpreter, typically cmd.exe.
|
['execute arbitrary commands', 'execute arbitrary commands via shell metacharacters (a']
|
CVE-2002-0062
|
Buffer overflow in ncurses 5.0, and the ncurses4 compatibility package as used in Red Hat Linux, allows local users to gain privileges, related to "routines for moving the physical cursor and scrolling."
|
['gain privileges', 'buffer overflow']
|
CVE-2002-0063
|
Buffer overflow in ippRead function of CUPS before 1.1.14 may allow attackers to execute arbitrary code via long attribute names or language values.
|
['execute arbitrary code', 'execute arbitrary code via long attribute names or', 'buffer overflow']
|
CVE-2002-0064
|
Funk Software Proxy Host 3.x is installed with insecure permissions for the registry and the file system.
|
['insecure permissions']
|
CVE-2002-0065
|
Funk Software Proxy Host 3.x uses weak encryption for the Proxy Host password, which allows local users to gain privileges by recovering the passwords from the PHOST.INI file or the Windows registry.
|
['gain privileges', 'gain privileges by recovering the passwords from the', 'weak encryption']
|
CVE-2002-0066
|
Funk Software Proxy Host 3.x before 3.09A creates a Named Pipe that does not require authentication and is installed with insecure access control, which allows local and possibly remote users to use the Proxy Host's configuration utilities and gain privileges.
|
['gain privileges', "use the Proxy Host's configuration utilities and", 'insecure access control']
|
CVE-2002-0067
|
Squid 2.4 STABLE3 and earlier does not properly disable HTCP, even when "htcp_port 0" is specified in squid.conf, which could allow remote attackers to bypass intended access restrictions.
|
['bypass intended access restrictions', 'htcp']
|
CVE-2002-0068
|
Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service (core dump) and possibly execute arbitrary code with an ftp:// URL with a larger number of special characters, which exceed the buffer when Squid URL-escapes the characters.
|
['execute arbitrary code', 'denial of service (core dump)', 'cause a denial of service (core dump']
|
CVE-2002-0069
|
Memory leak in SNMP in Squid 2.4 STABLE3 and earlier allows remote attackers to cause a denial of service.
|
['cause a denial of service', 'memory leak']
|
CVE-2002-0070
|
Buffer overflow in Windows Shell (used as the Windows Desktop) allows local and possibly remote attackers to execute arbitrary code via a custom URL handler that has not been removed for an application that has been improperly uninstalled.
|
['execute arbitrary code', 'execute arbitrary code via a custom URL handler', 'buffer overflow']
|
CVE-2002-0071
|
Buffer overflow in the ism.dll ISAPI extension that implements HTR scripting in Internet Information Server (IIS) 4.0 and 5.0 allows attackers to cause a denial of service or execute arbitrary code via HTR requests with long variable names.
|
['execute arbitrary code', 'cause a denial of service or execute arbitrary', 'buffer overflow']
|
CVE-2002-0072
|
The w3svc.dll ISAPI filter in Front Page Server Extensions and ASP.NET for Internet Information Server (IIS) 4.0, 5.0, and 5.1 does not properly handle the error condition when a long URL is provided, which allows remote attackers to cause a denial of service (crash) when the URL parser accesses a null pointer.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'null pointer']
|
CVE-2002-0073
|
The FTP service in Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows attackers who have established an FTP session to cause a denial of service via a specially crafted status request containing glob characters.
|
['cause a denial of service via a specially']
|
CVE-2002-0074
|
Cross-site scripting vulnerability in Help File search facility for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to embed scripts into another user's session.
|
["embed scripts into another user's session", 'cross-site scripting']
|
CVE-2002-0075
|
Cross-site scripting vulnerability for Internet Information Server (IIS) 4.0, 5.0 and 5.1 allows remote attackers to execute arbitrary script as other web users via the error message used in a URL redirect (""302 Object Moved") message.
|
['execute arbitrary script', 'execute arbitrary script as other web users via', 'cross-site scripting']
|
CVE-2002-0076
|
Java Runtime Environment (JRE) Bytecode Verifier allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, as seen in (1) Microsoft VM build 3802 and earlier as used in Internet Explorer 4.x and 5.x, (2) Netscape 6.2.1 and earlier, and possibly other implementations that use vulnerable versions of SDK or JDK, aka a variant of the "Virtual Machine Verifier" vulnerability.
|
['escape the Java sandbox and execute commands via', 'bytecode verifier', 'illegal cast operation', 'virtual machine verifier']
|
CVE-2002-0077
|
Microsoft Internet Explorer 5.01, 5.5 and 6.0 treats objects invoked on an HTML page with the codebase property as part of Local Computer zone, which allows remote attackers to invoke executables present on the local system through objects such as the popup object, aka the "Local Executable Invocation via Object tag" vulnerability.
|
['invoke executables present on the local system through', 'popup object', 'local executable invocation via object tag']
|
CVE-2002-0078
|
The zone determination function in Microsoft Internet Explorer 5.5 and 6.0 allows remote attackers to run scripts in the Local Computer zone by embedding the script in a cookie, aka the "Cookie-based Script Execution" vulnerability.
|
['run scripts in the Local Computer zone by', 'cookie-based script execution']
|
CVE-2002-0079
|
Buffer overflow in the chunked encoding transfer mechanism in Internet Information Server (IIS) 4.0 and 5.0 Active Server Pages allows attackers to cause a denial of service or execute arbitrary code.
|
['execute arbitrary code', 'cause a denial of service or execute arbitrary', 'buffer overflow']
|
CVE-2002-0080
|
rsync, when running in daemon mode, does not properly call setgroups before dropping privileges, which could provide supplemental group privileges to local users, who could then read certain files that would otherwise be disallowed.
|
[]
|
CVE-2002-0081
|
Buffer overflows in (1) php_mime_split in PHP 4.1.0, 4.1.1, and 4.0.6 and earlier, and (2) php3_mime_split in PHP 3.0.x allows remote attackers to execute arbitrary code via a multipart/form-data HTTP POST request when file_uploads is enabled.
|
['execute arbitrary code', 'execute arbitrary code via a multipart/form', 'buffer overflows']
|
CVE-2002-0082
|
The dbm and shm session cache code in mod_ssl before 2.8.7-1.3.23, and Apache-SSL before 1.3.22+1.46, does not properly initialize memory using the i2d_SSL_SESSION function, which allows remote attackers to use a buffer overflow to execute arbitrary code via a large client certificate that is signed by a trusted Certificate Authority (CA), which produces a large serialized session.
|
['execute arbitrary code', 'use a buffer overflow to execute arbitrary code']
|
CVE-2002-0083
|
Off-by-one error in the channel code of OpenSSH 2.0 through 3.0.2 allows local users or remote malicious servers to gain privileges.
|
['gain privileges', 'off-by-one error']
|
CVE-2002-0084
|
Buffer overflow in the fscache_setup function of cachefsd in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long mount argument.
|
['gain root privileges', 'gain root privileges via a long mount argument', 'buffer overflow']
|
CVE-2002-0085
|
cachefsd in Solaris 2.6, 7, and 8 allows remote attackers to cause a denial of service (crash) via an invalid procedure call in an RPC request.
|
['denial of service (crash)', 'cause a denial of service (crash)', 'invalid procedure call']
|
CVE-2002-0086
|
Buffer overflow in bindsock in Lotus Domino 5.0.4 and 5.0.7 on Linux allows local users to gain root privileges via a long (1) Notes_ExecDirectory or (2) PATH environment variable.
|
['gain root privileges', 'gain root privileges via a long (1', 'buffer overflow']
|
CVE-2002-0087
|
bindsock in Lotus Domino 5.07 on Solaris allows local users to create arbitrary files via a symlink attack on temporary files.
|
['create arbitrary files', 'create arbitrary files via a symlink attack on']
|
CVE-2002-0088
|
Buffer overflow in admintool in Solaris 2.6, 7, and 8 allows local users to gain root privileges via a long media installation path.
|
['gain root privileges', 'gain root privileges via a long media installation', 'buffer overflow']
|
CVE-2002-0089
|
Buffer overflow in admintool in Solaris 2.5 through 8 allows local users to gain root privileges via long arguments to (1) the -d command line option, or (2) the PRODVERS argument in the .cdtoc file.
|
['gain root privileges', 'gain root privileges via long arguments to (', 'buffer overflow']
|
CVE-2002-0090
|
Buffer overflow in Low BandWidth X proxy (lbxproxy) in Solaris 8 allows local users to execute arbitrary code via a long display command line option.
|
['execute arbitrary code', 'execute arbitrary code via a long display command', 'buffer overflow']
|
CVE-2002-0091
|
Multiple CGI scripts in CIDER SHADOW 1.5 and 1.6 allows remote attackers to execute arbitrary commands via certain form fields.
|
['execute arbitrary commands', 'execute arbitrary commands via certain form fields', 'cgi scripts']
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.