CVE List

Id CVE No. Status Description Phase Votes Comments Actions
199  CVE-1999-0200  Candidate  Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password.  Modified (19991130-01)  ACCEPT(1) Baker | MODIFY(2) Frech, Shostack | NOOP(2) Northcutt, Wall | REJECT(1) Christey | REVIEWING(1) Levy  Shostack> WFTP is not sufficient; is this wu-, ws-, war-, or another? | Frech> Other have mentioned this before, but it may be WU-FTP. | POSSIBLY XF:ftp-exec; does this have to do with the Site Exec allowing root | access without anon FTP or a regular account? | POSSIBLY XF:wu-ftpd-exec;same as above conditions, but instead from a | non-anon FTP account and gain root privs. | Christey> added MSKB reference | CHANGE> [Christey changed vote from REVOTE to REJECT] | Christey> The MSKB article may have confused things even more. There | were reports of problems in a Windows-based FTP server called | WFTP (http://www.wftpd.com/) that is not a Microsft FTP | server. It"s best to just kill this candidate where it | stands and start fresh.  View
197  CVE-1999-0197  Candidate  finger 0@host on some systems may print information on some user accounts.  Proposed (19990726)  ACCEPT(1) Baker | MODIFY(2) Frech, Shostack | REJECT(1) Northcutt  Shostack> fingerd may respond to "finger 0@host" with account info | Frech> Need more reference to establish this "exposure". | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:finger-unused-accounts(8378) | We"re entering it into our database solely to track | competition. The only references seem to be product listings: | http://hq.mcafeeasap.com/vulnerabilities/vuln_data/1000.asp (1002 | Finger 0@host check) | http://www.ipnsa.com/ipnsa_vuln.htm?step=1000 (Finger 0@host check) | http://cgi.nessus.org/plugins/dump.php3?id=10069 (Finger zero at host | feature)  View
198  CVE-1999-0198  Candidate  finger .@host on some systems may print information on some user accounts.  Proposed (19990726)  ACCEPT(1) Baker | MODIFY(2) Frech, Shostack | REJECT(1) Northcutt  Shostack> as above | Frech> Need more reference to establish this "exposure". | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:finger-unused-accounts(8378) | We"re entering it into our database solely to track | competition. The only references seem to be product listings: | http://hq.mcafeeasap.com/vulnerabilities/vuln_data/1000.asp (1004 | Finger .@target-host check) | http://www.ipnsa.com/ipnsa_vuln.htm?step=1000 (Finger .@target-host | check ) | http://cgi.nessus.org/plugins/dump.php3?id=10072 (Finger dot at host | feature)  View
772  CVE-1999-0792  Candidate  ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration.  Modified (20000827)  ACCEPT(1) Baker | MODIFY(2) Frech, Stracener | NOOP(1) Christey | REVIEWING(1) Levy  Stracener> Change the Ref to read: ROOTSHELL: Osicom Technologies ROUTERmate | Security | Advisory | Frech> XF:routermate-snmp-community | Christey> BUGTRAQ:19980914 [rootshell] Security Bulletin #23 | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=90581019105693&w=2  View
248  CVE-1999-0249  Candidate  Windows NT RSHSVC program allows remote users to execute arbitrary commands.  Proposed (19990714)  ACCEPT(1) Baker | MODIFY(2) Frech, Wall | NOOP(2) Northcutt, Shostack | RECAST(1) Christey | REVIEWING(1) Levy  Wall> Windows NT Rshsvc.exe from the Windows NT Resource Kit allows | remote | users to execute arbitrary commands. | Source: rshsvc.txt from the Windows NT Resource Kit. | Frech> XF:rsh-svc | Christey> MSKB:Q158320, last reviewed in January 1999, refers to a case | where remote users coming from authorized machines are | allowed access regardless of what .rhosts says. XF:rsh-svc | refers to a bug circa 1997 where any remote entity could | execute commands as system.  View

Page 637 of 20943, showing 5 records out of 104715 total, starting on record 3181, ending on 3185

Actions