CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
2267 | CVE-2000-0691 | Candidate | The faxrunq and faxrunqd in the mgetty package allows local users to create or modify arbitrary files via a symlink attack which creates a symlink in from /var/spool/fax/outgoing/.last_run to the target file. | Proposed (20000921) | ACCEPT(1) Levy | MODIFY(2) Cox, Frech | NOOP(3) Christey, Cole, Wall | Frech> XF:mgetty-faxrunq-symlink | Christey> ADDREF XF:mgetty-faxrunq-symlink | ADDREF URL:http://xforce.iss.net/static/5159.php | ADDREF REDHAT:RHSA-2000:059-02 | ADDREF BUGTRAQ:20000830 Conectiva Linux Security Announcement - mgetty | ADDREF MANDRAKE:MDKSA-2000:042 | Christey> ADDREF REDHAT:RHSA-2000:059-02 | Christey> ADDREF FREEBSD:FreeBSD-SA-00:71 | ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:71.mgetty.asc | Frech> XF:mgetty-faxrunq-symlink(5159) | Cox> ADDREF REDHAT:RHSA-2000:059 | View |
3348 | CVE-2001-0534 | Candidate | Multiple buffer overflows in RADIUS daemon radiusd in (1) Merit 3.6b and (2) Lucent 2.1-2 RADIUS allow remote attackers to cause a denial of service or execute arbitrary commands. | Modified (20080304) | ACCEPT(2) Baker, Stracener | MODIFY(2) Christey, Frech | NOOP(5) Armstrong, Cole, Foat, Wall, Ziese | Frech> XF:merit-radius-authentication-bo(6812) | XF:lucent-radius-authentication-bo(6794) | Change ISS URL to http://xforce.iss.net/alerts/advise87.php | Christey> BID:2989 | BID:2991 | View |
1776 | CVE-2000-0198 | Candidate | Buffer overflow in POP3 and IMAP servers in the MERCUR mail server suite allows remote attackers to cause a denial of service. | Proposed (20000322) | ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(5) Baker, Blake, Cole, LeBlanc, Wall | Frech> XF:mercur-login-dos | The following don"t seem to be correct: | Reference: | URL:http://archives.neohapsis.com/archives/ntbugtraq/current/0206.html | Perhaps it is: | http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0206.html | Reference: | URL:http://archives.neohapsis.com/archives/bugtraq/current/0137.html | Perhaps it is: | http://archives.neohapsis.com/archives/bugtraq/2000-03/0137.html | View |
1904 | CVE-2000-0326 | Candidate | Meeting Maker uses weak encryption (a polyalphabetic substitution cipher) for passwords, which allows remote attackers to sniff and decrypt passwords for Meeting Maker accounts. | Proposed (20000518) | ACCEPT(2) Baker, Levy | MODIFY(1) Frech | NOOP(4) Christey, Cole, LeBlanc, Wall | Frech> XF:meetingmaker-weak-encryption | Christey> Add original Bugtraq reference at: | http://archives.neohapsis.com/archives/bugtraq/2000-04/0223.html | Also ADDREF XF:meetingmaker-weak-encryption | View |
3063 | CVE-2001-0242 | Candidate | Buffer overflows in Microsoft Windows Media Player 7 and earlier allow remote attackers to execute arbitrary commands via (1) a long version tag in an .ASX file, or (2) a long banner tag, a variant of the ".ASX Buffer Overrun" vulnerability as discussed in MS:MS00-090. | Modified (20050509) | ACCEPT(6) Baker, Cole, Magdych, Wall, Williams, Ziese | MODIFY(1) Frech | NOOP(1) Renaud | Frech> XF:mediaplayer-asx-bo(5574) | View |
Page 132 of 20943, showing 5 records out of 104715 total, starting on record 656, ending on 660