CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
467 | CVE-1999-0469 | Candidate | Internet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client. | Proposed (19990728) | ACCEPT(1) Wall | NOOP(2) Baker, Northcutt | REJECT(3) Christey, Frech, LeBlanc | Wall> Reference: Microsoft Security Bulletin MS99-012 | Christey> DUPE CVE-1999-0488 | Frech> Defer to Christey"s vote. | However, XF:ie-mshtml-crossframe(2216) assigned to CVE-1999-0488. | LeBlanc> Duplicate | View |
553 | CVE-1999-0569 | Candidate | A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file. | Modified (19991130-01) | ACCEPT(1) Wall | NOOP(2) Baker, Christey | REJECT(1) Northcutt | Northcutt> I do this intentionally somethings in high content directories | Christey> XF:http-noindex(90) ? | View |
571 | CVE-1999-0589 | Candidate | A system-critical Windows NT registry key has inappropriate permissions. | Proposed (19990803) | ACCEPT(1) Wall | NOOP(1) Baker | RECAST(2) Christey, Northcutt | Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can"t see a way to phrase specific keys in a way that | defines inappropriate. | Christey> Upon further reflection, this is too high-level for CVE. | Specific registry keys with bad permissions is roughly | equivalent to Unix configuration files that have bad | permissions; those permission problems can be created by | any vendor, not just a specific one. Therefore this | candidate should be RECAST into each separate registry | key that has this problem. | View |
646 | CVE-1999-0664 | Candidate | An application-critical Windows NT registry key has inappropriate permissions. | Proposed (19990803) | ACCEPT(1) Wall | NOOP(1) Baker | RECAST(2) Christey, Northcutt | Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can"t see a way to phrase specific keys in a way that | defines inappropriate. | Christey> Upon further reflection, this is too high-level for CVE. | Specific registry keys with bad permissions is roughly | equivalent to Unix configuration files that have bad | permissions; those permission problems can be created by | any vendor, not just a specific one. Therefore this | candidate should be RECAST into each separate registry | key that has this problem. | View |
562 | CVE-1999-0580 | Candidate | The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions. | Proposed (19990803) | ACCEPT(1) Wall | NOOP(1) Baker | RECAST(1) Northcutt | Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can"t see a way to phrase specific keys in a way that | defines inappropriate. | Baker> This is way vague... | View |
Page 20194 of 20943, showing 5 records out of 104715 total, starting on record 100966, ending on 100970