CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
2365 | CVE-2000-0789 | Candidate | WinU 5.x and earlier uses weak encryption to store its configuration password, which allows local users to decrypt the password and gain privileges. | Proposed (20000921) | ACCEPT(1) Williams | MODIFY(2) Baker, Frech | NOOP(3) Christey, Cole, Wall | REVIEWING(1) Levy | Frech> XF:winu-backdoor(5376) | Christey> ADDREF BID:1741 | ADDREF URL:http://www.securityfocus.com/bid/1741 | Baker> Since there are apparently two different methods of weak encryption, perhaps the description should read " ... used weak encryption methods.." | View |
3308 | CVE-2001-0491 | Candidate | Directory traversal vulnerability in RaidenFTPD Server 2.1 before build 952 allows attackers to access files outside the ftp root via dot dot attacks, such as (1) .... in CWD, (2) .. in NLST, or (3) ... in NLST. | Modified (20010910-01) | ACCEPT(1) Williams | MODIFY(2) Baker, Frech | NOOP(4) Cole, Renaud, Wall, Ziese | Frech> XF:raidenftpd-dot-directory-traversal(6455) | Baker> Should probably modify description to say v2.1 prior to build 952, since the interim builds also had similar problems until build 952 resolved this. | View |
3250 | CVE-2001-0432 | Candidate | Buffer overflows in various CGI programs in the remote administration service for Trend Micro Interscan VirusWall 3.01 allow remote attackers to execute arbitrary commands. | Proposed (20010524) | ACCEPT(1) Ziese | MODIFY(1) Frech | NOOP(2) Cole, Wall | Frech> XF:interscan-viruswall-isadmin-bo(6368) | View |
3496 | CVE-2001-0688 | Candidate | Broker FTP Server 5.9.5.0 allows a remote attacker to cause a denial of service by repeatedly issuing an invalid CD or CWD ("CD . .") command. | Proposed (20010829) | ACCEPT(1) Ziese | MODIFY(1) Frech | NOOP(4) Armstrong, Bishop, Cole, Foat | REVIEWING(1) Wall | Frech> XF:broker-ftp-dot-bo(6673) | View |
3497 | CVE-2001-0689 | Candidate | Vulnerability in TrendMicro Virus Control System 1.8 allows a remote attacker to view configuration files and change the configuration via a certain CGI program. | Proposed (20010829) | ACCEPT(1) Ziese | MODIFY(2) Christey, Frech | NOOP(4) Armstrong, Cole, Foat, Wall | REVIEWING(1) Bishop | Frech> XF:vcs-cgi-auth-bypass(6677) | CHANGE> [Armstrong changed vote from REVIEWING to NOOP] | Christey> BID:2842 | URL:http://www.securityfocus.com/bid/2842 | View |
Page 752 of 20943, showing 5 records out of 104715 total, starting on record 3756, ending on 3760