CVE List

Id CVE No. Status Description Phase Votes Comments Actions
2726  CVE-2000-1159  Candidate  NAI Sniffer Agent allows remote attackers to gain privileges on the agent by sniffing the initial UDP authentication packets and spoofing commands.  Proposed (20001219)  ACCEPT(2) Baker, Cole | MODIFY(1) Frech | NOOP(1) Wall | REVIEWING(1) Christey  Frech> XF:sniffer-agent-snmp-bo(5455) | Christey> Consult NAI on this one.  View
2724  CVE-2000-1157  Candidate  Buffer overflow in NAI Sniffer Agent allows remote attackers to execute arbitrary commands via a long SNMP community name.  Proposed (20001219)  MODIFY(1) Frech | NOOP(2) Cole, Wall  Frech> XF:sniffer-agent-snmp-bo(5455)  View
2727  CVE-2000-1160  Candidate  NAI Sniffer Agent allows remote attackers to cause a denial of service (crash) by sending a large number of login requests.  Proposed (20001219)  ACCEPT(2) Baker, Cole | MODIFY(1) Frech | NOOP(1) Wall | REVIEWING(1) Christey  Frech> XF:sniffer-agent-login-dos(5456) | Christey> Consult NAI on this one.  View
3819  CVE-2001-1015  Candidate  Buffer overflow in Snes9x 1.37, when installed setuid root, allows local users to gain root privileges via a long command line argument.  Proposed (20020131)  ACCEPT(1) Green | MODIFY(1) Frech | NOOP(3) Cole, Foat, Wall  Frech> XF:snes9x-rom-bo(7295)  View
509  CVE-1999-0512  Candidate  A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.  Modified (20020427-01)  ACCEPT(3) Baker, Northcutt, Shostack | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:smtp-sendmail-relay(210) | XF:ntmail-relay(2257) | XF:exchange-relay(3107) (also assigned to CVE-1999-0682) | XF:smtp-relay-uucp(3470) | XF:sco-sendmail-spam(4342) | XF:sco-openserver-mmdf-spam(4343) | XF:lotus-domino-smtp-mail-relay(6591) | XF:win2k-smtp-mail-relay(6803) | XF:cobalt-poprelayd-mail-relay(6806) | | Candidate implicitly may refer to relaying settings enabled by default, or | the bypass/circumvention of relaying. Both interpretations were used in | assigning this candidate. | Christey> The intention of this candidate is to cover configurations in | which the admin has explicitly enabled relaying. Other cases | in which the application *intends* to prvent relaying, but | there is some specific input that bypasses/tricks it, count | as vulnerabilities (or exposures?) and as such would be | assigned different numbers. | | http://www.sendmail.org/~ca/email/spam.html seems like a good | general resource, as does ftp://ftp.isi.edu/in-notes/rfc2505.txt | Christey> I changed the description to make it more clear that the issue | is that of explicit configuration, as opposed to being the | result of a vulnerability.  View

Page 85 of 20943, showing 5 records out of 104715 total, starting on record 421, ending on 425

Actions