CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3005 | CVE-2001-0184 | Candidate | eEye Iris 1.01 beta allows remote attackers to cause a denial of service via a malformed packet, which causes Iris to crash when a user views the packet. | Proposed (20010309) | ACCEPT(4) Baker, Frech, Lawler, Ziese | View | |
721 | CVE-1999-0741 | Candidate | QMS CrownNet Unix Utilities for 2060 allows root to log on without a password. | Proposed (19991222) | ACCEPT(4) Baker, Frech, Levy, Stracener | NOOP(2) Christey, Oliver | Christey> change description - anyone can log on *as* root | Frech> (Note: this XF also cataloged under CVE-1999-0508.) | View |
644 | CVE-1999-0662 | Candidate | A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete. | Proposed (19990804) | ACCEPT(4) Baker, Hill, Northcutt, Wall | View | |
642 | CVE-1999-0660 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc." | Modified (20080730) | ACCEPT(4) Baker, Hill, Northcutt, Wall | NOOP(1) Christey | Christey> Add "back door" to description. | View |
643 | CVE-1999-0661 | Candidate | A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6. | Modified (20050529) | ACCEPT(4) Baker, Hill, Northcutt, Wall | REVIEWING(1) Christey | Christey> Should add the specific CERT advisory references for | well-known Trojaned software. | TCP Wrappers -> CERT:CA-1999-01 | CERT:CA-1999-02 includes util-linux | wuarchive - CERT:CA-94.07 | IRC client - CERT:CA-1994-14 | Christey> BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | Modify description to use dot notation. | Christey> CERT:CA-2002-24 | URL:http://www.cert.org/advisories/CA-2002-24.html | XF:openssh-backdoor(9763) | URL:http://www.iss.net/security_center/static/9763.php | BID:5374 | URL:http://www.securityfocus.com/bid/5374 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Add libpcap and tcpdump: | BUGTRAQ:20021113 Latest libpcap & tcpdump sources from tcpdump.org contain a trojan | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103722456708471&w=2 | CERT:CA-2002-30 | URL:http://www.cert.org/advisories/CA-2002-30.html | | This CAN has been active for over 4 years. At this moment, my | thinking is that we should SPLIT this CAN into each separate | trojaned product, then create some criteria that restrict | creation of new CANs to "widespread" or "important" products only. | View |
Page 1032 of 20943, showing 5 records out of 104715 total, starting on record 5156, ending on 5160