CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1862  CVE-2000-0284  Candidate  Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.  Proposed (20000426)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Christey> ADDREF FREEBSD:FreeBSD-SA-00:14 | URL:http://www.securityfocus.com/templates/advisory.html?id=2179 | Frech> XF:imap-mailserver-bo  View
1871  CVE-2000-0293  Candidate  aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory.  Proposed (20000426)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Christey> ADDREF SUSE:20000502 aaabase < 2000.5.2 | URL: http://www.suse.de/de/support/security/suse_security_announce_47.txt | | This advisory references another problem that is listed in | CVE-2000-0433. | Frech> XF:aaabase-file-deletion  View
2280  CVE-2000-0704  Candidate  Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands.  Modified (20060505)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall  Frech> XF:irix-worldview-wnn-bo | Christey> XF:irix-worldview-wnn-bo | http://xforce.iss.net/static/5163.php  View
1775  CVE-2000-0197  Candidate  The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.  Proposed (20000322)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Blake, Ozancin | REJECT(1) LeBlanc | REVIEWING(1) Wall  LeBlanc> this is just bad security practice, not a vulnerability | Frech> XF:nt-at-drive-mappings  View
1696  CVE-2000-0118  Candidate  The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.  Proposed (20000208)  ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(1) Wall | REVIEWING(1) Christey  Frech> Is this the same issue as BugTraq Mailing List, Wed, 9 Jun 1999 14:07:27 | -0700 "vulnerability in su/PAM in redhat" at | http://www.netspace.org/cgi-bin/wa?A2=ind9906b&L=bugtraq&F=&S=&P=5356 and | "Solaris 2.5 /bin/su [was: vulnerability in su/PAM in redhat]" at | http://www.netspace.org/cgi-bin/wa?A2=ind9906b&L=bugtraq&F=&S=&P=6051 | If so, then MODIFY XF:su-brute | Christey> BID:320 | URL:http://www.securityfocus.com/vdb/bottom.html?vid=320 | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:su-brute(2278) | This issue involves more platforms than Red Hat. See BugTraq | Mailing List, Thu Jun 10 1999 12:13:06, "Solaris 2.5 /bin/su [was: | vulnerability in su/PAM in redhat]", | http://www.securityfocus.com/archive/1/14854 | Christey> It does look like this is the same issue as the other Bugtraq | post that explicitly mentions Red Hat and PAM. | CHANGE> [Christey changed vote from NOOP to REVIEWING]  View

Page 20007 of 20943, showing 5 records out of 104715 total, starting on record 100031, ending on 100035

Actions