CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
544 | CVE-1999-0556 | Candidate | Two or more Unix accounts have the same UID. | Proposed (19990728) | NOOP(2) Baker, Christey | REJECT(2) Northcutt, Shostack | Christey> XF:duplicate-uid(876) | Christey> Add terms "duplicate" and "user ID" to facilitate search. | ftp://ftp.auscert.org.au/pub/auscert/papers/unix_security_checklist | View |
2058 | CVE-2000-0480 | Candidate | Dragon telnet server allows remote attackers to cause a denial of service via a long username. | Proposed (20000712) | ACCEPT(2) Baker, Levy | MODIFY(1) Frech | NOOP(1) Christey | Christey> XF:dragon-telnet-dos | Frech> XF:dragon-ftp-dos(4691) | View |
2057 | CVE-2000-0479 | Candidate | Dragon FTP server allows remote attackers to cause a denial of service via a long USER command. | Proposed (20000712) | ACCEPT(2) Baker, Levy | MODIFY(1) Frech | NOOP(1) Christey | Christey> XF:dragon-ftp-dos | Frech> XF:dragon-ftp-dos(4691) | View |
2291 | CVE-2000-0715 | Candidate | DiskCheck script diskcheck.pl in Red Hat Linux 6.2 allows local users to create or overwrite arbitrary files via a symlink attack on a temporary file. | Modified (20080226) | ACCEPT(3) Baker, Levy, Williams | MODIFY(2) Christey, Cox | NOOP(2) Cole, Wall | Christey> XF:diskcheck-tmp-race-condition | http://xforce.iss.net/static/5061.php | Christey> ADDREF REDHAT:RHSA-2000:122-04 ? | The advisory addresses some diskcheck symlink vulnerability, | but the initial announcement was 4 months before the advisory | was released; however, the DiskCheck versions seem to | correspond. | Christey> See various Bugtraq posts relating to this, and verify if the | Conectiva/Red Hat/etc. advisories are really addressing this | particular problem. | e.g.: BUGTRAQ:20000622 Re: rh 6.2 - gid compromises, etc [+ MORE!!!] | http://marc.theaimsgroup.com/?l=bugtraq&m=96172022819526&w=2 | BUGTRAQ:20000810 CONECTIVA LINUX SECURITY ANNOUNCEMENT - diskcheck | http://marc.theaimsgroup.com/?l=bugtraq&m=96604843017702&w=2 | REDHAT:RHSA-2000:122-06 | http://marc.theaimsgroup.com/?l=bugtraq&m=97649229201967&w=2 | BID:2050 | URL:http://www.securityfocus.com/bid/2050 | Christey> The following RedHat advisory appears to identify the same | problem as one that was posted to Bugtraq on August 8, 2000: | REDHAT:RHSA-2000:122-06 | http://www.redhat.com/support/errata/powertools/RHSA-2000-122.html | | See the following BugID, as referenced in the advisory: | http://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=11724 | So, add: | BID:2050 | URL:http://www.securityfocus.com/bid/2050 | XF:linux-diskcheck-race-symlink | URL:http://xforce.iss.net/static/5624.php | | [note the apparent BID duplicates, however] | CHANGE> [Christey changed vote from NOOP to MODIFY] | Christey> Missing BID - BID:1552 | Cox> ADDREF REDHAT:RHSA-2000:122 | View |
5073 | CVE-2002-0683 | Candidate | Directory traversal vulnerability in Carello 1.3 allows remote attackers to execute programs on the server via a .. (dot dot) in the VBEXE parameter. | Modified (20040818) | ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(6) Armstrong, Christey, Cole, Cox, Foat, Wall | Christey> XF:carello-local-file-execution(9521) | URL:http://www.iss.net/security_center/static/9521.php | BID:5192 | URL:http://www.securityfocus.com/bid/5192 | Christey> VULNWATCH:20021002 wp-02-0012: Carello 1.3 Remote File Execution (Updated 1/10/2002) | Frech> XF:carello-local-file-execution(9521) | View |
Page 276 of 20943, showing 5 records out of 104715 total, starting on record 1376, ending on 1380