CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1597 | CVE-2000-0019 | Candidate | IMail POP3 daemon uses weak encryption, which allows local users to read files. | Proposed (20000111) | ACCEPT(3) Armstrong, Baker, Stracener | MODIFY(2) Frech, Levy | NOOP(1) Christey | Frech> XF:imail-passwords | Levy> BID 880 | Christey> BUGTRAQ:19990304 IMAIL password recovery is trivial. | http://www.securityfocus.com/archive/1/12750 | Christey> Add version numbers (5.0 through 5.08) | View |
1613 | CVE-2000-0035 | Candidate | resend command in Majordomo allows local users to gain privileges via shell metacharacters. | Proposed (20000111) | ACCEPT(3) Baker, Levy, Stracener | MODIFY(2) Cox, Frech | NOOP(1) Armstrong | REVIEWING(1) Christey | Frech> XF:majordomo-local-resend | Christey> The Bugtraq thread indicates that this problem may be | due to misconfiguration, and may extend beyond just the | resend command. | CHANGE> [Armstrong changed vote from REVIEWING to NOOP] | Christey> Include "wrapper" to facilitate search and matching? (but | double-check CVE-2000-0037). | Add "1.94.4 and earlier" as the affected version number. | ADDREF AUSCERT:AA-2000.01 | ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-2000.01 | Cox> ADDREF REDHAT:RHSA-2000:005 | View |
1616 | CVE-2000-0038 | Candidate | glFtpD includes a default glftpd user account with a default password and a UID of 0. | Proposed (20000111) | ACCEPT(2) Armstrong, Stracener | MODIFY(2) Frech, Levy | NOOP(1) Baker | Frech> XF:glftpd-default-account | Levy> BID 881 | View |
1632 | CVE-2000-0054 | Candidate | search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack. | Proposed (20000125) | MODIFY(1) Frech | Frech> XF:http-cgi-homefree-search | View |
1633 | CVE-2000-0055 | Candidate | Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. | Proposed (20000125) | MODIFY(2) Baker, Frech | NOOP(1) Dik | Frech> XF:sol-chkperm-bo(3870) | Dik> chkperm runs set-uid bin, so initially the access granted | will be user bin, not root. (Though bin access can easily be leveraged | to root access, less so in Solaris 8+) | Also, there is reason to believe this bug is not exploitable; the buffer | overflown is declared in the stack in main(); yet, the program never | returns from main() but calls exit instead so any damage to return addresses | is never noticed. | Baker> Maybe the details from Caspar could be included, or modify the description somewhat | View |
Page 20560 of 20943, showing 5 records out of 104715 total, starting on record 102796, ending on 102800