CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
5467 | CVE-2002-1080 | Candidate | The Administration console for Abyss Web Server 1.0.3 before Patch 2 allows remote attackers to gain privileges and modify server configuration via direct requests to CHL files such as (1) srvstatus.chl, (2) consport.chl, (3) general.chl, (4) srvparam.chl, and (5) advanced.chl. | Modified (20071016) | ACCEPT(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall | Frech> CONFIRM:http://www.aprelium.com/news/patch1033.html | Christey> CONFIRM:http://www.aprelium.com/news/patch1033.html | View |
3784 | CVE-2001-0979 | Candidate | Buffer overflow in swverify in HP-UX 11.0, and possibly other programs, allows local users to gain privileges via a long command line argument. | Proposed (20020131) | ACCEPT(2) Frech, Green | NOOP(3) Cole, Foat, Wall | Frech> CONFIRM:http://archives.neohapsis.com/archives/hp/2001-q1/006 | 9.html | View |
3400 | CVE-2001-0587 | Candidate | deliver program in MMDF 2.43.3b in SCO OpenServer 5.0.6 can allow a local attacker to gain additional privileges via a buffer overflow in the first argument to the command. | Modified (20020225-01) | ACCEPT(4) Baker, Bishop, Frech, Williams | NOOP(5) Christey, Cole, Foat, Wall, Ziese | Frech> CONFIRM:ftp://ftp.sco.com/SSE/sse072b.ltr | Christey> SCO fixed a number of mail-related issues. This is affected | by CD:SF-EXEC. There may be related CANs. | View |
245 | CVE-1999-0246 | Candidate | HP Remote Watch allows a remote user to gain root access. | Proposed (19990630) | ACCEPT(4) Frech, Hill, Northcutt, Prosser | NOOP(1) Baker | RECAST(1) Christey | Frech> Comment: Determine if it"s RemoteWatch or Remote Watch. | Christey> HP:HPSBUX9610-039 alludes to multiple vulnerabilities in | Remote Watch (the advisory uses two words, not one, for the | "Remote Watch" name) | | ADDREF BUGTRAQ:19961015 HP/UX Remote Watch (was Re: BoS: SOD remote exploit) | URL:http://www.securityfocus.com/templates/archive.pike?list=1&msg=199610151351.JAA18241@grymoire.crd.ge.com | Prosser> agree that the advisory mentions two vulnerabilities in Remote | Watch, one being a socket connection and other with the showdisk utility | which seems to be a suid vulnerability. Never get much details on this | anywhere since the recommendation is to remove the program since it is | obsolete and superceded by later tools. Believe the biggest concern here is | to just not run the tool at all. | Christey> CIAC:H-16 | Also, http://www.cert.org/vendor_bulletins/VB-96.20.hp | And possibly AUSCERT:AA-96.07 at | ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.07.HP-UX.Remote.Watch.vul | Christey> Also BUGTRAQ:19961013 BoS: SOD remote exploit | http://marc.theaimsgroup.com/?l=bugtraq&m=87602167419969&w=2 | Include "remwatch" in the description to facilitate search. | View |
592 | CVE-1999-0610 | Candidate | An incorrect configuration of the Webcart CGI program could disclose private information. | Proposed (19990728) | ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(2) Northcutt, Wall | Frech> Cite reference as: | BUGTRAQ:19990424 Re: Shopping Carts exposing CC data | URL: | http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist% | 3D1%26date%3D2000-08-22%26msg%3D3720E2B6.6031A2E7@datashopper.dk | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:webcart-data-exposure(8374) | View |
Page 236 of 20943, showing 5 records out of 104715 total, starting on record 1176, ending on 1180