CVE List

Id CVE No. Status Description Phase Votes Comments Actions
353  CVE-1999-0354  Candidate  Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn"t warn the user that the template contains executable content. Also applies to Outlook when the client views a malicious email message.  Proposed (19990623)  ACCEPT(3) Baker, Ozancin, Wall | MODIFY(1) Frech | NOOP(1) Christey  Frech> XF:word97-template-macro | Christey> CHANGEREF NTBUGTRAQ:19990127 IE 4/5/Outlook + Word 97 security hole | URL:http://marc.theaimsgroup.com/?l=ntbugtraq&m=91747570922757&w=2 | BID:196 | http://www.securityfocus.com/bid/196 | Christey> MSKB:Q214652 | http://support.microsoft.com/support/kb/articles/q214/6/52.asp  View
597  CVE-1999-0615  Candidate  ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running."  Modified (20080731)  ACCEPT(3) Baker, Prosser, Wall | NOOP(1) Christey | REJECT(1) Northcutt  Baker> Although newer versions on snmp are not as vulnerable as prior versions, | this can still be a significant risk of exploitation, as seen in recent | attacks on snmp services via automated worms | Christey> XF:snmp(132) ? | Prosser> This fits the "exposure" description although we also know there are many vulnerabilities in SNMP. This is more of a policy/best practice issue for administrators. If you need SNMP lock it down as tight as you can, if you don"t need it, don"t run it.  View
558  CVE-1999-0576  Candidate  A Windows NT system"s file audit policy does not log an event success or failure for security-critical files or directories.  Proposed (19990721)  ACCEPT(3) Baker, Shostack, Wall | MODIFY(2) Frech, Ozancin | REJECT(1) Northcutt  Northcutt> 1.) Too general are we ready to state what the security-critical files | and directories are | 2.) Does Ataris, Windows CE, PalmOS, Linux have such a capability | Ozancin> Some files and directories are clearly understood to be critical. Others are | unclear. We need to clarify that critical is. | Frech> XF:nt-object-audit  View
561  CVE-1999-0579  Candidate  A Windows NT system"s registry audit policy does not log an event success or failure for non-critical registry keys.  Proposed (19990721)  ACCEPT(3) Baker, Shostack, Wall | MODIFY(2) Frech, Ozancin | REJECT(1) Northcutt  Ozancin> Again only failure may be of interest. It would be impractical to wad | through the incredibly large amount of logging that this would generate. It | could overwhelm log entries that you might find interesting. | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:nt-object-audit(228)  View
4539  CVE-2002-0145  Candidate  chuid 1.2 and earlier does not properly verify the ownership of files that will be changed, which allows remote attackers to change files owned by other users, such as root.  Modified (20050527)  ACCEPT(3) Balinsky, Cole, Green | MODIFY(1) Frech | NOOP(3) Foat, Wall, Ziese  Frech> XF:chuid-unauthorized-ownership-change(7976)  View

Page 955 of 20943, showing 5 records out of 104715 total, starting on record 4771, ending on 4775

Actions