CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1715 | CVE-2000-0137 | Candidate | The CartIt shopping cart application allows remote users to modify sensitive purchase information via hidden form fields. | Proposed (20000208) | ACCEPT(1) Baker | MODIFY(1) Frech | RECAST(1) Cole | REVIEWING(1) Wall | Cole> See comments for CVE-2000-0101 | Frech> XF:shopping-cart-form-tampering | View |
1632 | CVE-2000-0054 | Candidate | search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack. | Proposed (20000125) | MODIFY(1) Frech | Frech> XF:http-cgi-homefree-search | View |
1633 | CVE-2000-0055 | Candidate | Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option. | Proposed (20000125) | MODIFY(2) Baker, Frech | NOOP(1) Dik | Frech> XF:sol-chkperm-bo(3870) | Dik> chkperm runs set-uid bin, so initially the access granted | will be user bin, not root. (Though bin access can easily be leveraged | to root access, less so in Solaris 8+) | Also, there is reason to believe this bug is not exploitable; the buffer | overflown is declared in the stack in main(); yet, the program never | returns from main() but calls exit instead so any damage to return addresses | is never noticed. | Baker> Maybe the details from Caspar could be included, or modify the description somewhat | View |
1636 | CVE-2000-0058 | Candidate | Network HotSync program in Handspring Visor does not have authentication, which allows remote attackers to retrieve email and files. | Proposed (20000125) | MODIFY(2) Baker, Frech | NOOP(1) Christey | Frech> XF:handspring-visor-auth(3873) | Consider removing the security-express.com reference, since it is identical | to the BugTraq reference. The BugTraq reference is (hopefully) not going to | disappear soon, and the security-express.com reference provides no new or | additional information. | Christey> URLs will begin to be included with candidates to support | Board members" voting activities. They will be converted to | the generalized reference format when if candidate is | ACCEPTed and becomes an official entry. | Christey> The problem may not be a lack of authentication (as mentioned | by the poster), but rather weak authentication (the apparent | need to provide the same username). | Baker> MOdify description to indicate the weak authentication | View |
1637 | CVE-2000-0059 | Candidate | PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands. | Proposed (20000125) | ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(1) Christey | Frech> XF:php3-popen-execute(3900) | Christey> CONFIRM:http://www.php.net/ChangeLog.php3 | Section dated January 11, 2000 says: "Fix safe-mode problem in | popen() (Kristian)" | View |
Page 381 of 20943, showing 5 records out of 104715 total, starting on record 1901, ending on 1905