CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
551 | CVE-1999-0566 | Entry | An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities. | View | |||
552 | CVE-1999-0568 | Candidate | rpc.admind in Solaris is not running in a secure mode. | Proposed (19990728) | ACCEPT(1) Northcutt | NOOP(2) Baker, Christey | RECAST(2) Dik, Shostack | Shostack> are there secure modes? | Dik> Several: | 1) there is no "rpc.admind" daemon. | there used to be a "admind" RPC daemon (100087/10) | and there"s now an "sadmind" daemon (100232/10) | The switch over was somewhere around Solaris 2.4. | 2) Neither defaults to "secure mode" | 3) secure mode is "using secure RPC" which does | proper over the wire authentication by specifying | the "-S 2" option in inetd.conf | (security level 2) | Christey> XF:rpc-admind(626) | http://xforce.iss.net/static/626.php | MISC:http://pulhas.org/xploitsdb/mUNIXes/admind.html | View |
553 | CVE-1999-0569 | Candidate | A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file. | Modified (19991130-01) | ACCEPT(1) Wall | NOOP(2) Baker, Christey | REJECT(1) Northcutt | Northcutt> I do this intentionally somethings in high content directories | Christey> XF:http-noindex(90) ? | View |
554 | CVE-1999-0570 | Candidate | Windows NT is not using a password filter utility, e.g. PASSFILT.DLL. | Proposed (19990728) | ACCEPT(1) Northcutt | MODIFY(1) Frech | NOOP(2) Baker, Christey | REJECT(1) Wall | Northcutt> Here we are crossing into the best practices arena again. However since | passfilt does establish a measurable standard and since we aren"t the | ones defining the stanard, simply saying it should be employed I will | vote for this. | Frech> XF:nt-passfilt-not-inst(1308) | XF:nt-passfilt-not-found(1309) | Christey> Consider MSKB:Q161990 and MSKB:Q151082 | View |
555 | CVE-1999-0571 | Candidate | A router"s configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts. | Modified (20020312-01) | ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(2) Christey, Northcutt | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:ascend-config-kill(889) | XF:cisco-ios-crash(1238) | XF:webramp-remote-access(1670) | XF:ascom-timeplex-debug(1824) | XF:netopia-unpassworded(1850) | XF:cisco-web-crash(1886) | XF:cisco-router-commands(1951) | XF:motorola-cable-default-pass(2002) | XF:default-flowpoint(2091) | XF:netgear-router-idle-dos(4003) | XF:cisco-cbos-telnet(4251) | XF:routermate-snmp-community(4290) | XF:cayman-router-dos(4479) | XF:wavelink-authentication(5185) | XF:ciscosecure-ldap-bypass-authentication(5274) | XF:foundry-firmware-telnet-dos(5514) | XF:netopia-view-system-log(5536) | XF:cisco-webadmin-remote-dos(5595) | XF:cisco-cbos-web-access(5626) | XF:netopia-telnet-dos(6001) | XF:cisco-sn-gain-access(6827) | XF:cayman-dsl-insecure-permissions(6841) | XF:linksys-etherfast-reveal-passwords(6949) | XF:zyxel-router-default-password(6968) | XF:cisco-cbos-web-config(7027) | XF:prestige-wan-bypass-filter(7146) | Christey> I changed the description to make it more explicit that this | candidate is about router configuration, as opposed to | vulnerabilities that accidentally make a configuration | service accessible to anyone. | View |
Page 111 of 20943, showing 5 records out of 104715 total, starting on record 551, ending on 555