CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3005  CVE-2001-0184  Candidate  eEye Iris 1.01 beta allows remote attackers to cause a denial of service via a malformed packet, which causes Iris to crash when a user views the packet.  Proposed (20010309)  ACCEPT(4) Baker, Frech, Lawler, Ziese    View
721  CVE-1999-0741  Candidate  QMS CrownNet Unix Utilities for 2060 allows root to log on without a password.  Proposed (19991222)  ACCEPT(4) Baker, Frech, Levy, Stracener | NOOP(2) Christey, Oliver  Christey> change description - anyone can log on *as* root | Frech> (Note: this XF also cataloged under CVE-1999-0508.)  View
644  CVE-1999-0662  Candidate  A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.  Proposed (19990804)  ACCEPT(4) Baker, Hill, Northcutt, Wall    View
642  CVE-1999-0660  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc."  Modified (20080730)  ACCEPT(4) Baker, Hill, Northcutt, Wall | NOOP(1) Christey  Christey> Add "back door" to description.  View
643  CVE-1999-0661  Candidate  A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.  Modified (20050529)  ACCEPT(4) Baker, Hill, Northcutt, Wall | REVIEWING(1) Christey  Christey> Should add the specific CERT advisory references for | well-known Trojaned software. | TCP Wrappers -> CERT:CA-1999-01 | CERT:CA-1999-02 includes util-linux | wuarchive - CERT:CA-94.07 | IRC client - CERT:CA-1994-14 | Christey> BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | Modify description to use dot notation. | Christey> CERT:CA-2002-24 | URL:http://www.cert.org/advisories/CA-2002-24.html | XF:openssh-backdoor(9763) | URL:http://www.iss.net/security_center/static/9763.php | BID:5374 | URL:http://www.securityfocus.com/bid/5374 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Add libpcap and tcpdump: | BUGTRAQ:20021113 Latest libpcap & tcpdump sources from tcpdump.org contain a trojan | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103722456708471&w=2 | CERT:CA-2002-30 | URL:http://www.cert.org/advisories/CA-2002-30.html | | This CAN has been active for over 4 years. At this moment, my | thinking is that we should SPLIT this CAN into each separate | trojaned product, then create some criteria that restrict | creation of new CANs to "widespread" or "important" products only.  View

Page 1032 of 20943, showing 5 records out of 104715 total, starting on record 5156, ending on 5160

Actions