CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
3809 | CVE-2001-1005 | Candidate | Starfish Truesync Desktop 2.0b as used on the REX 5000 PDA uses weak encryption to store the user password in a registry key, which allows attackers who have access to the registry key to decrypt the password and gain privileges. | Proposed (20020131) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Armstrong, Cole, Foat, Wall | Frech> XF:truesync-desktop-insecure-passwords(7031) | View |
3810 | CVE-2001-1006 | Candidate | Starfish Truesync Desktop 2.0b as used on the REX 5000 PDA does not encrypt sensitive files and relies solely on its password feature to restrict access, which allows an attacker to read the files using a different application. | Proposed (20020131) | ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Armstrong, Cole, Foat, Wall | Frech> XF:truesync-desktop-insecure-passwords(7031) | View |
2776 | CVE-2000-1209 | Candidate | The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida. | Modified (20071113) | ACCEPT(5) Armstrong, Baker, Cole, Green, Wall | MODIFY(1) Frech | NOOP(3) Christey, Cox, Foat | Frech> XF:tumbleweed-mms-blank-password(5072) | XF:msde-mssql-default-password(9154) | May overlap with CVE-2000-0772. | Christey> fix desc - "installed with a default password" appears twice. | View |
4165 | CVE-2001-1361 | Candidate | Vulnerability in The Web Information Gateway (TWIG) 2.7.1, possibly related to incorrect security rights and/or the generation of mailto links. | Proposed (20020611) | ACCEPT(3) Alderson, Cole, Green | MODIFY(1) Frech | NOOP(3) Cox, Foat, Wall | Frech> XF:twig-mailto(9871) | View |
3115 | CVE-2001-0294 | Candidate | Directory traversal vulnerability in TYPSoft FTP Server 0.85 allows remote attackers to read arbitrary files via (1) a .. (dot dot) in a GET command, or (2) a ... in a CWD command. | Proposed (20010404) | MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | REVIEWING(2) Bishop, Christey | Frech> XF:typsoft-ftp-directory-traversal(6165) | Christey> BID:2489 | | The CWD... may have been rediscovered for version 0.95 in: | BUGTRAQ:20010507 Vulnerabilty in TYPsoft FTP server | URL:http://online.securityfocus.com/archive/1/183917 | | However, this CWD uses ".../" whereas the initial post | used just "..." and said that the vendor had fixed the issue. | So, this is probably just an incomplete fix by the vendor. | View |
Page 20877 of 20943, showing 5 records out of 104715 total, starting on record 104381, ending on 104385