CVE List

Id CVE No. Status Description Phase Votes Comments Actions
467  CVE-1999-0469  Candidate  Internet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client.  Proposed (19990728)  ACCEPT(1) Wall | NOOP(2) Baker, Northcutt | REJECT(3) Christey, Frech, LeBlanc  Wall> Reference: Microsoft Security Bulletin MS99-012 | Christey> DUPE CVE-1999-0488 | Frech> Defer to Christey"s vote. | However, XF:ie-mshtml-crossframe(2216) assigned to CVE-1999-0488. | LeBlanc> Duplicate  View
553  CVE-1999-0569  Candidate  A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.  Modified (19991130-01)  ACCEPT(1) Wall | NOOP(2) Baker, Christey | REJECT(1) Northcutt  Northcutt> I do this intentionally somethings in high content directories | Christey> XF:http-noindex(90) ?  View
571  CVE-1999-0589  Candidate  A system-critical Windows NT registry key has inappropriate permissions.  Proposed (19990803)  ACCEPT(1) Wall | NOOP(1) Baker | RECAST(2) Christey, Northcutt  Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can"t see a way to phrase specific keys in a way that | defines inappropriate. | Christey> Upon further reflection, this is too high-level for CVE. | Specific registry keys with bad permissions is roughly | equivalent to Unix configuration files that have bad | permissions; those permission problems can be created by | any vendor, not just a specific one. Therefore this | candidate should be RECAST into each separate registry | key that has this problem.  View
646  CVE-1999-0664  Candidate  An application-critical Windows NT registry key has inappropriate permissions.  Proposed (19990803)  ACCEPT(1) Wall | NOOP(1) Baker | RECAST(2) Christey, Northcutt  Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can"t see a way to phrase specific keys in a way that | defines inappropriate. | Christey> Upon further reflection, this is too high-level for CVE. | Specific registry keys with bad permissions is roughly | equivalent to Unix configuration files that have bad | permissions; those permission problems can be created by | any vendor, not just a specific one. Therefore this | candidate should be RECAST into each separate registry | key that has this problem.  View
562  CVE-1999-0580  Candidate  The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.  Proposed (19990803)  ACCEPT(1) Wall | NOOP(1) Baker | RECAST(1) Northcutt  Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can"t see a way to phrase specific keys in a way that | defines inappropriate. | Baker> This is way vague...  View

Page 20194 of 20943, showing 5 records out of 104715 total, starting on record 100966, ending on 100970

Actions