CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1005 | CVE-1999-1025 | Candidate | CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user"s console session when the host is an NIS+ client, which allows others with physical access to login with any string. | Proposed (20010912) | ACCEPT(4) Cole, Dik, Foat, Stracener | MODIFY(1) Frech | Frech> XF:solaris-cde-nisplus-lock(7473) | Dik> sun bug: 4115685 | View |
4061 | CVE-2001-1257 | Candidate | Cross-site scripting vulnerability in Horde Internet Messaging Program (IMP) before 2.2.6 and 1.2.6 allows remote attackers to execute arbitrary Javascript embedded in an email. | Proposed (20020502) | ACCEPT(4) Cole, Cox, Frech, Green | NOOP(2) Foat, Wall | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | View |
4062 | CVE-2001-1258 | Candidate | Horde Internet Messaging Program (IMP) before 2.2.6 allows local users to read IMP configuration files and steal the Horde database password by placing the prefs.lang file containing PHP code on the server. | Proposed (20020502) | ACCEPT(4) Cole, Cox, Frech, Green | NOOP(2) Foat, Wall | Cox> VERIFYING. | CHANGE> [Cox changed vote from REVIEWING to ACCEPT] | View |
2584 | CVE-2000-1015 | Candidate | The default configuration of Slashcode before version 2.0 Alpha has a default administrative password, which allows remote attackers to gain Slashcode priviliges and possibly execute arbitrary commands. | Proposed (20001129) | ACCEPT(4) Cole, Collins, Frech, Mell | NOOP(1) Wall | View | |
557 | CVE-1999-0575 | Candidate | A Windows NT system"s user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking. | Proposed (19990721) | ACCEPT(4) Christey, Ozancin, Shostack, Wall | MODIFY(1) Frech | RECAST(2) Baker, Northcutt | Northcutt> It isn"t a great truth that you should enable all or the above, if you | do you potentially introduce a vulnerbility of filling up the file | system with stuff you will never look at. | Ozancin> It is far less interesting what a user does successfully that what they | attempt and fail at. | Christey> The list of event types is very useful for lookup. | Frech> XF:nt-system-audit | XF:nt-logon-audit | XF:nt-object-audit | XF:nt-privil-audit | XF:nt-process-audit | XF:nt-policy-audit | XF:nt-account-audit | CHANGE> [Baker changed vote from REVIEWING to RECAST] | View |
Page 19905 of 20943, showing 5 records out of 104715 total, starting on record 99521, ending on 99525