CVE List

Id CVE No. Status Description Phase Votes Comments Actions
631  CVE-1999-0649  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running."  Modified (20080731)  ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt    View
634  CVE-1999-0652  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL."  Modified (20080731)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(1) Wall | REJECT(1) Northcutt  Frech> XF:nt-sql-server(1289) | XF:msql-detect(2211) | XF:oracle-detect(2388) | XF:sybase-detect-namedpipes(1461)  View
637  CVE-1999-0655  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities."  Modified (20080731)  ACCEPT(5) Baker, Frech, Northcutt, Ozancin, Wall  CHANGE> [Frech changed vote from REVIEWING to ACCEPT]  View
638  CVE-1999-0656  Candidate  The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.  Modified (20080731)  ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt    View
640  CVE-1999-0658  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running."  Modified (20080731)  ACCEPT(2) Baker, Wall | REJECT(1) Northcutt    View

Page 20500 of 20943, showing 5 records out of 104715 total, starting on record 102496, ending on 102500

Actions