CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5474 | CVE-2002-1087 | Candidate | The scripts (1) createdir.php, (2) removedir.php and (3) uploadfile.php for ezContents 1.41 and earlier do not check credentials, which allows remote attackers to create or delete directories and upload files via a direct HTTP POST request. | Proposed (20020830) | ACCEPT(1) Foat | NOOP(3) Cole, Cox, Wall | View | |
3908 | CVE-2001-1104 | Candidate | SonicWALL SOHO uses easily predictable TCP sequence numbers, which allows remote attackers to spoof or hijack sessions. | Proposed (20020315) | ACCEPT(1) Foat | MODIFY(1) Frech | NOOP(5) Armstrong, Cole, Green, Wall, Ziese | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:tcp-seq-predict(139) | View |
3590 | CVE-2001-0783 | Candidate | Cisco TFTP server 1.1 allows remote attackers to read arbitrary files via a ..(dot dot) attack in the GET command. | Modified (20050706) | ACCEPT(1) Foat | MODIFY(1) Frech | NOOP(4) Armstrong, Cole, Oliver, Wall | Frech> XF:cisco-tftp-directory-traversal(6722) | View |
3740 | CVE-2001-0934 | Candidate | Cooolsoft PowerFTP Server 2.03 allows remote attackers to obtain the physical path of the server root via the pwd command, which lists the full pathname. | Proposed (20020131) | ACCEPT(1) Foat | MODIFY(1) Frech | NOOP(4) Armstrong, Christey, Cole, Wall | Frech> (ACCEPT; Task 2353) | Christey> Rediscovered in: | BUGTRAQ:20020211 PowerFTP Personal FTP Server Multiple Vulnerabilities | http://marc.theaimsgroup.com/?l=bugtraq&m=101361745222207&w=2 | This rediscovery says the problem is in 2.10. | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:powerftp-pwd-path-disclosure(8182) | Christey> BID:4072 | URL:http://online.securityfocus.com/bid/4072 | View |
5115 | CVE-2002-0725 | Candidate | NTFS file system in Windows NT 4.0 and Windows 2000 SP2 allows local attackers to hide file usage activities via a hard link to the target file, which causes the link to be recorded in the audit trail instead of the target file. | Modified (20040725) | ACCEPT(1) Foat | MODIFY(1) Frech | NOOP(4) Armstrong, Christey, Cole, Cox | REVIEWING(1) Wall | Christey> XF:win-ntfs-bypass-auditing(9869) | URL:http://www.iss.net/security_center/static/9869.php | BID:5484 | URL:http://www.securityfocus.com/bid/5484 | Frech> XF:win-ntfs-bypass-auditing(9869) | View |
Page 20274 of 20943, showing 5 records out of 104715 total, starting on record 101366, ending on 101370