CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
890 | CVE-1999-0910 | Candidate | Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user. | Proposed (19991208) | ACCEPT(4) Baker, Ozancin, Prosser, Wall | MODIFY(2) Frech, Stracener | REJECT(1) Cole | Frech> XF:siteserver-cis-cookie-cache | Cole> Whether cookies are a vulnerbality is a debate for another time, the | question here is whether the | expiration feature is a vulnerability and I do not think it is | because the underlying concerns for this | are present even without this feature. The expiration feature does | not add any new vulenrabilities | that are not already present with cookies. | Stracener> Add Ref: MSKB Q238647 | View |
556 | CVE-1999-0572 | Candidate | .reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks. | Modified (20041017) | ACCEPT(4) Baker, Ozancin, Shostack, Wall | MODIFY(1) Frech | NOOP(2) Christey, Northcutt | Northcutt> I don"t quite get what this means, sorry | Frech> XF:nt-regfile(178) | Christey> MISC:http://security-archive.merton.ox.ac.uk/nt-security-199902/0087.html | View |
548 | CVE-1999-0562 | Candidate | The registry in Windows NT can be accessed remotely by users who are not administrators. | Modified (20061101) | ACCEPT(4) Baker, Ozancin, Shostack, Wall | MODIFY(1) Frech | RECAST(1) Northcutt | Northcutt> This isn"t all or nothing, users may be allowed to access part of the | registry. | Frech> XF:nt-winreg-all | XF:nt-winreg-net | View |
560 | CVE-1999-0578 | Candidate | A Windows NT system"s registry audit policy does not log an event success or failure for security-critical registry keys. | Proposed (19990721) | ACCEPT(4) Baker, Ozancin, Shostack, Wall | MODIFY(1) Frech | REJECT(1) Northcutt | Ozancin> with reservation | Again what is defined as critical | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:nt-object-audit(228) | View |
4481 | CVE-2002-0087 | Candidate | bindsock in Lotus Domino 5.07 on Solaris allows local users to create arbitrary files via a symlink attack on temporary files. | Modified (20050528) | ACCEPT(4) Balinsky, Cole, Foat, Green | NOOP(3) Christey, Wall, Ziese | Christey> Consider adding BID:4318 | CHANGE> [Foat changed vote from NOOP to ACCEPT] | Christey> CONFIRM:http://www-1.ibm.com/support/manager.wss?rs=463&rt=0&org=sims&doc=93B3ED336951525385256B7D006A3CE3 | VULNWATCH:20020429 [VulnWatch] eSecurityOnline Security Advisory 4125 - Lotus Domino bindsock arbitrary file creation vulnerability | URL:http://archives.neohapsis.com/archives/vulnwatch/2002-q2/0045.html | View |
Page 1036 of 20943, showing 5 records out of 104715 total, starting on record 5176, ending on 5180