CVE List

Id CVE No. Status Description Phase Votes Comments Actions
1715  CVE-2000-0137  Candidate  The CartIt shopping cart application allows remote users to modify sensitive purchase information via hidden form fields.  Proposed (20000208)  ACCEPT(1) Baker | MODIFY(1) Frech | RECAST(1) Cole | REVIEWING(1) Wall  Cole> See comments for CVE-2000-0101 | Frech> XF:shopping-cart-form-tampering  View
1632  CVE-2000-0054  Candidate  search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack.  Proposed (20000125)  MODIFY(1) Frech  Frech> XF:http-cgi-homefree-search  View
1633  CVE-2000-0055  Candidate  Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option.  Proposed (20000125)  MODIFY(2) Baker, Frech | NOOP(1) Dik  Frech> XF:sol-chkperm-bo(3870) | Dik> chkperm runs set-uid bin, so initially the access granted | will be user bin, not root. (Though bin access can easily be leveraged | to root access, less so in Solaris 8+) | Also, there is reason to believe this bug is not exploitable; the buffer | overflown is declared in the stack in main(); yet, the program never | returns from main() but calls exit instead so any damage to return addresses | is never noticed. | Baker> Maybe the details from Caspar could be included, or modify the description somewhat  View
1636  CVE-2000-0058  Candidate  Network HotSync program in Handspring Visor does not have authentication, which allows remote attackers to retrieve email and files.  Proposed (20000125)  MODIFY(2) Baker, Frech | NOOP(1) Christey  Frech> XF:handspring-visor-auth(3873) | Consider removing the security-express.com reference, since it is identical | to the BugTraq reference. The BugTraq reference is (hopefully) not going to | disappear soon, and the security-express.com reference provides no new or | additional information. | Christey> URLs will begin to be included with candidates to support | Board members" voting activities. They will be converted to | the generalized reference format when if candidate is | ACCEPTed and becomes an official entry. | Christey> The problem may not be a lack of authentication (as mentioned | by the poster), but rather weak authentication (the apparent | need to provide the same username). | Baker> MOdify description to indicate the weak authentication  View
1637  CVE-2000-0059  Candidate  PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.  Proposed (20000125)  ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:php3-popen-execute(3900) | Christey> CONFIRM:http://www.php.net/ChangeLog.php3 | Section dated January 11, 2000 says: "Fix safe-mode problem in | popen() (Kristian)"  View

Page 381 of 20943, showing 5 records out of 104715 total, starting on record 1901, ending on 1905

Actions