CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1005  CVE-1999-1025  Candidate  CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user"s console session when the host is an NIS+ client, which allows others with physical access to login with any string.  Proposed (20010912)  ACCEPT(4) Cole, Dik, Foat, Stracener | MODIFY(1) Frech  Frech> XF:solaris-cde-nisplus-lock(7473) | Dik> sun bug: 4115685  View
4061  CVE-2001-1257  Candidate  Cross-site scripting vulnerability in Horde Internet Messaging Program (IMP) before 2.2.6 and 1.2.6 allows remote attackers to execute arbitrary Javascript embedded in an email.  Proposed (20020502)  ACCEPT(4) Cole, Cox, Frech, Green | NOOP(2) Foat, Wall  CHANGE> [Cox changed vote from REVIEWING to ACCEPT]  View
4062  CVE-2001-1258  Candidate  Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server.  Proposed (20020502)  ACCEPT(4) Cole, Cox, Frech, Green | NOOP(2) Foat, Wall  Cox> VERIFYING. | CHANGE> [Cox changed vote from REVIEWING to ACCEPT]  View
2584  CVE-2000-1015  Candidate  The default configuration of Slashcode before version 2.0 Alpha has a default administrative password, which allows remote attackers to gain Slashcode priviliges and possibly execute arbitrary commands.  Proposed (20001129)  ACCEPT(4) Cole, Collins, Frech, Mell | NOOP(1) Wall    View
557  CVE-1999-0575  Candidate  A Windows NT system"s user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking.  Proposed (19990721)  ACCEPT(4) Christey, Ozancin, Shostack, Wall | MODIFY(1) Frech | RECAST(2) Baker, Northcutt  Northcutt> It isn"t a great truth that you should enable all or the above, if you | do you potentially introduce a vulnerbility of filling up the file | system with stuff you will never look at. | Ozancin> It is far less interesting what a user does successfully that what they | attempt and fail at. | Christey> The list of event types is very useful for lookup. | Frech> XF:nt-system-audit | XF:nt-logon-audit | XF:nt-object-audit | XF:nt-privil-audit | XF:nt-process-audit | XF:nt-policy-audit | XF:nt-account-audit | CHANGE> [Baker changed vote from REVIEWING to RECAST]  View

Page 19905 of 20943, showing 5 records out of 104715 total, starting on record 99521, ending on 99525

Actions