CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1736  CVE-2000-0158  Candidate  Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon.  Modified (20000403-01)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall  Frech> XF:sco-mmdf-bo  View
1741  CVE-2000-0163  Candidate  asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file.  Proposed (20000223)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall  Frech> XF:asmon-ascpu-execute-commands | (Not sims-slapd-logfiles)  View
1826  CVE-2000-0248  Candidate  The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands.  Modified (20070924)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | REJECT(1) Cox  Christey> Typo fix: change "passowrd" to "password" | ADDREF BID:1148 | ADDREF URL:http://www.securityfocus.com/bid/1148 | Christey> ADDREF XF:piranha-default-password | Frech> XF:piranha-default-password | In description, passowrd should be password. | Cox> The "execute arbitrary commands" part is a seperate vulnerability, | already assigned CVE-2000-0322. The package was designed to have no | password on installation, so "backdoor" does not apply. When users | install Piranha they are expected to add a password to the web | administration GUI, it"s a documented part of the procedure. "The web | GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux | Piranha package installs with a default password" is accurate if it | qualifies as an exposure. | Christey> BUGTRAQ:20000425 piranha default password/exploit | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=95668829621268&w=2 | | Default accounts/passwords need to be accounted for in CVE, | but the question is what level of abstraction to use - a | separate CVE for each password, or one CVE for all passwords, | or somewhere in the middle? That is the crux of CD:CF-PASS.  View
2360  CVE-2000-0784  Candidate  sshd program in the Rapidstream 2.1 Beta VPN appliance has a hard-coded "rsadmin" account with a null password, which allows remote attackers to execute arbitrary commands via ssh.  Proposed (20000921)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Christey> XF:rapidstream-remote-execution | http://xforce.iss.net/static/5093.php | Frech> XF:rapidstream-remote-execution(5093)  View
2367  CVE-2000-0791  Candidate  Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.  Proposed (20000921)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Christey> XF:trustix-secure-apache-misconfig | http://xforce.iss.net/static/5099.php | Frech> XF:trustix-secure-apache-misconfig(5099)  View

Page 20006 of 20943, showing 5 records out of 104715 total, starting on record 100026, ending on 100030

Actions