CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1597  CVE-2000-0019  Candidate  IMail POP3 daemon uses weak encryption, which allows local users to read files.  Proposed (20000111)  ACCEPT(3) Armstrong, Baker, Stracener | MODIFY(2) Frech, Levy | NOOP(1) Christey  Frech> XF:imail-passwords | Levy> BID 880 | Christey> BUGTRAQ:19990304 IMAIL password recovery is trivial. | http://www.securityfocus.com/archive/1/12750 | Christey> Add version numbers (5.0 through 5.08)  View
1613  CVE-2000-0035  Candidate  resend command in Majordomo allows local users to gain privileges via shell metacharacters.  Proposed (20000111)  ACCEPT(3) Baker, Levy, Stracener | MODIFY(2) Cox, Frech | NOOP(1) Armstrong | REVIEWING(1) Christey  Frech> XF:majordomo-local-resend | Christey> The Bugtraq thread indicates that this problem may be | due to misconfiguration, and may extend beyond just the | resend command. | CHANGE> [Armstrong changed vote from REVIEWING to NOOP] | Christey> Include "wrapper" to facilitate search and matching? (but | double-check CVE-2000-0037). | Add "1.94.4 and earlier" as the affected version number. | ADDREF AUSCERT:AA-2000.01 | ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-2000.01 | Cox> ADDREF REDHAT:RHSA-2000:005  View
1616  CVE-2000-0038  Candidate  glFtpD includes a default glftpd user account with a default password and a UID of 0.  Proposed (20000111)  ACCEPT(2) Armstrong, Stracener | MODIFY(2) Frech, Levy | NOOP(1) Baker  Frech> XF:glftpd-default-account | Levy> BID 881  View
1632  CVE-2000-0054  Candidate  search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack.  Proposed (20000125)  MODIFY(1) Frech  Frech> XF:http-cgi-homefree-search  View
1633  CVE-2000-0055  Candidate  Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option.  Proposed (20000125)  MODIFY(2) Baker, Frech | NOOP(1) Dik  Frech> XF:sol-chkperm-bo(3870) | Dik> chkperm runs set-uid bin, so initially the access granted | will be user bin, not root. (Though bin access can easily be leveraged | to root access, less so in Solaris 8+) | Also, there is reason to believe this bug is not exploitable; the buffer | overflown is declared in the stack in main(); yet, the program never | returns from main() but calls exit instead so any damage to return addresses | is never noticed. | Baker> Maybe the details from Caspar could be included, or modify the description somewhat  View

Page 20560 of 20943, showing 5 records out of 104715 total, starting on record 102796, ending on 102800

Actions