CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1871 | CVE-2000-0293 | Candidate | aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory. | Proposed (20000426) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Christey> ADDREF SUSE:20000502 aaabase < 2000.5.2 | URL: http://www.suse.de/de/support/security/suse_security_announce_47.txt | | This advisory references another problem that is listed in | CVE-2000-0433. | Frech> XF:aaabase-file-deletion | View |
2280 | CVE-2000-0704 | Candidate | Buffer overflow in SGI Omron WorldView Wnn allows remote attackers to execute arbitrary commands via long JS_OPEN, JS_MKDIR, or JS_FILE_INFO commands. | Modified (20060505) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:irix-worldview-wnn-bo | Christey> XF:irix-worldview-wnn-bo | http://xforce.iss.net/static/5163.php | View |
1826 | CVE-2000-0248 | Candidate | The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands. | Modified (20070924) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) Christey, Wall | REJECT(1) Cox | Christey> Typo fix: change "passowrd" to "password" | ADDREF BID:1148 | ADDREF URL:http://www.securityfocus.com/bid/1148 | Christey> ADDREF XF:piranha-default-password | Frech> XF:piranha-default-password | In description, passowrd should be password. | Cox> The "execute arbitrary commands" part is a seperate vulnerability, | already assigned CVE-2000-0322. The package was designed to have no | password on installation, so "backdoor" does not apply. When users | install Piranha they are expected to add a password to the web | administration GUI, it"s a documented part of the procedure. "The web | GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux | Piranha package installs with a default password" is accurate if it | qualifies as an exposure. | Christey> BUGTRAQ:20000425 piranha default password/exploit | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=95668829621268&w=2 | | Default accounts/passwords need to be accounted for in CVE, | but the question is what level of abstraction to use - a | separate CVE for each password, or one CVE for all passwords, | or somewhere in the middle? That is the crux of CD:CF-PASS. | View |
1736 | CVE-2000-0158 | Candidate | Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon. | Modified (20000403-01) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall | Frech> XF:sco-mmdf-bo | View |
1741 | CVE-2000-0163 | Candidate | asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file. | Proposed (20000223) | ACCEPT(3) Baker, Cole, Levy | MODIFY(1) Frech | NOOP(2) LeBlanc, Wall | Frech> XF:asmon-ascpu-execute-commands | (Not sims-slapd-logfiles) | View |
Page 938 of 20943, showing 5 records out of 104715 total, starting on record 4686, ending on 4690