CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
2262 | CVE-2000-0686 | Candidate | Auction Weaver CGI script 1.03 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack in the fromfile parameter. | Proposed (20000921) | ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:cgi-auction-weaver-read-files | Frech> XF:cgi-auction-weaver-read-files(5150) | View |
2263 | CVE-2000-0687 | Candidate | Auction Weaver CGI script 1.03 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack in the catdir parameter. | Proposed (20000921) | ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:cgi-auction-weaver-read-files | Christey> Need to double-check BID"s on all these Auction Weaver prob"s. | Frech> XF:cgi-auction-weaver-read-files(5150) | View |
2264 | CVE-2000-0688 | Candidate | Subscribe Me LITE does not properly authenticate attempts to change the administrator password, which allows remote attackers to gain privileges for the Account Manager by directly calling the subscribe.pl script with the setpwd parameter. | Proposed (20000921) | ACCEPT(2) Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:subscribe-me-overwrite-password | Christey> Make sure the mention of Account Manager is correct. | XF:subscribe-me-overwrite-password | http://xforce.iss.net/static/5126.php | Frech> XF:subscribe-me-overwrite-password(5126) | View |
2266 | CVE-2000-0690 | Candidate | Auction Weaver CGI script 1.02 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the fromfile parameter. | Proposed (20000921) | ACCEPT(1) Baker | MODIFY(2) Frech, Levy | NOOP(3) Christey, Cole, Wall | Levy> Reference: BID 1645 | Christey> BID:1645 | URL:http://www.securityfocus.com/bid/1645 | Frech> XF:auction-weaver-execute-commands(6175) | View |
2267 | CVE-2000-0691 | Candidate | The faxrunq and faxrunqd in the mgetty package allows local users to create or modify arbitrary files via a symlink attack which creates a symlink in from /var/spool/fax/outgoing/.last_run to the target file. | Proposed (20000921) | ACCEPT(1) Levy | MODIFY(2) Cox, Frech | NOOP(3) Christey, Cole, Wall | Frech> XF:mgetty-faxrunq-symlink | Christey> ADDREF XF:mgetty-faxrunq-symlink | ADDREF URL:http://xforce.iss.net/static/5159.php | ADDREF REDHAT:RHSA-2000:059-02 | ADDREF BUGTRAQ:20000830 Conectiva Linux Security Announcement - mgetty | ADDREF MANDRAKE:MDKSA-2000:042 | Christey> ADDREF REDHAT:RHSA-2000:059-02 | Christey> ADDREF FREEBSD:FreeBSD-SA-00:71 | ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:71.mgetty.asc | Frech> XF:mgetty-faxrunq-symlink(5159) | Cox> ADDREF REDHAT:RHSA-2000:059 | View |
Page 20598 of 20943, showing 5 records out of 104715 total, starting on record 102986, ending on 102990