CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1766 | CVE-2000-0188 | Candidate | EZShopper 3.0 search.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters. | Proposed (20000322) | ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(6) Baker, Blake, Christey, Cole, LeBlanc, Wall | Christey> The exploit is different than CVE-2000-0187 by going through | a different field in a different script, so maybe this should | be kept separate, even though it"s probably another open() | call problem. | Frech> XF:ezshopper-search-cgi(4045) | View |
1768 | CVE-2000-0190 | Candidate | AOL Instant Messenger (AIM) client allows remote attackers to cause a denial of service via a message with a malformed ASCII value. | Proposed (20000322) | ACCEPT(2) Blake, Cole | MODIFY(1) Frech | NOOP(3) Baker, LeBlanc, Ozancin | REVIEWING(2) Levy, Wall | Frech> XF:aolim-malformed-ascii-dos(4877) | View |
1775 | CVE-2000-0197 | Candidate | The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file. | Proposed (20000322) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Blake, Ozancin | REJECT(1) LeBlanc | REVIEWING(1) Wall | LeBlanc> this is just bad security practice, not a vulnerability | Frech> XF:nt-at-drive-mappings | View |
1776 | CVE-2000-0198 | Candidate | Buffer overflow in POP3 and IMAP servers in the MERCUR mail server suite allows remote attackers to cause a denial of service. | Proposed (20000322) | ACCEPT(2) Levy, Ozancin | MODIFY(1) Frech | NOOP(5) Baker, Blake, Cole, LeBlanc, Wall | Frech> XF:mercur-login-dos | The following don"t seem to be correct: | Reference: | URL:http://archives.neohapsis.com/archives/ntbugtraq/current/0206.html | Perhaps it is: | http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0206.html | Reference: | URL:http://archives.neohapsis.com/archives/bugtraq/current/0137.html | Perhaps it is: | http://archives.neohapsis.com/archives/bugtraq/2000-03/0137.html | View |
1777 | CVE-2000-0199 | Candidate | When a new SQL Server is registered in Enterprise Manager for Microsoft SQL Server 7.0 and the "Always prompt for login name and password" option is not set, then the Enterprise Manager uses weak encryption to store the login ID and password. | Proposed (20000322) | ACCEPT(6) Baker, Blake, Cole, Levy, Ozancin, Wall | MODIFY(1) Frech | REVIEWING(2) Christey, LeBlanc | LeBlanc> I think this may just be user error - I"d like more information. | Frech> XF:mssql-weak-encryption | ISS:Vulnerability in Microsoft SQL Server 7.0 Encryption Used to Store | Administrative Login ID | URL:http://xforce.iss.net/alerts/advise45.php3 | Christey> According to Scott Culp, this can only be reproduced if the | SQL server is running in an unsafe mode that is not | recommended by Microsoft: "To securely use SQL Server, | Microsoft recommends using Windows Integrated Security. In | Windows Integrated Security mode passwords are never stored, | as your Windows Domain sign-on is used as the security | identifier to the database server." | | We still must consider approving this candidate, however, as a | user configuration error instead of a software flaw. | CD:DESIGN-WEAK-ENCRYPTION applies in this case, so if we | decide to include configuration problems in which a user | intentionally selects weak encryption, then we might still | approve this candidate. | View |
Page 373 of 20943, showing 5 records out of 104715 total, starting on record 1861, ending on 1865