CVE List

Id CVE No. Status Description Phase Votes Comments Actions
3809  CVE-2001-1005  Candidate  Starfish Truesync Desktop 2.0b as used on the REX 5000 PDA uses weak encryption to store the user password in a registry key, which allows attackers who have access to the registry key to decrypt the password and gain privileges.  Proposed (20020131)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Armstrong, Cole, Foat, Wall  Frech> XF:truesync-desktop-insecure-passwords(7031)  View
3810  CVE-2001-1006  Candidate  Starfish Truesync Desktop 2.0b as used on the REX 5000 PDA does not encrypt sensitive files and relies solely on its password feature to restrict access, which allows an attacker to read the files using a different application.  Proposed (20020131)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(4) Armstrong, Cole, Foat, Wall  Frech> XF:truesync-desktop-insecure-passwords(7031)  View
2776  CVE-2000-1209  Candidate  The "sa" account is installed with a default null password on (1) Microsoft SQL Server 2000, (2) SQL Server 7.0, and (3) Data Engine (MSDE) 1.0, including third party packages that use these products such as (4) Tumbleweed Secure Mail (MMS) (5) Compaq Insight Manager, and (6) Visio 2000, which allows remote attackers to gain privileges, as exploited by worms such as Voyager Alpha Force and Spida.  Modified (20071113)  ACCEPT(5) Armstrong, Baker, Cole, Green, Wall | MODIFY(1) Frech | NOOP(3) Christey, Cox, Foat  Frech> XF:tumbleweed-mms-blank-password(5072) | XF:msde-mssql-default-password(9154) | May overlap with CVE-2000-0772. | Christey> fix desc - "installed with a default password" appears twice.  View
4165  CVE-2001-1361  Candidate  Vulnerability in The Web Information Gateway (TWIG) 2.7.1, possibly related to incorrect security rights and/or the generation of mailto links.  Proposed (20020611)  ACCEPT(3) Alderson, Cole, Green | MODIFY(1) Frech | NOOP(3) Cox, Foat, Wall  Frech> XF:twig-mailto(9871)  View
3115  CVE-2001-0294  Candidate  Directory traversal vulnerability in TYPSoft FTP Server 0.85 allows remote attackers to read arbitrary files via (1) a .. (dot dot) in a GET command, or (2) a ... in a CWD command.  Proposed (20010404)  MODIFY(1) Frech | NOOP(3) Cole, Wall, Ziese | REVIEWING(2) Bishop, Christey  Frech> XF:typsoft-ftp-directory-traversal(6165) | Christey> BID:2489 | | The CWD... may have been rediscovered for version 0.95 in: | BUGTRAQ:20010507 Vulnerabilty in TYPsoft FTP server | URL:http://online.securityfocus.com/archive/1/183917 | | However, this CWD uses ".../" whereas the initial post | used just "..." and said that the vendor had fixed the issue. | So, this is probably just an incomplete fix by the vendor.  View

Page 20877 of 20943, showing 5 records out of 104715 total, starting on record 104381, ending on 104385

Actions