CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1021 | CVE-1999-1041 | Candidate | Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file. | Proposed (20010912) | ACCEPT(3) Cole, Foat, Stracener | MODIFY(1) Frech | NOOP(1) Wall | REVIEWING(1) Christey | Frech> XF:sco-openserver-mscreen-bo(1379) | Christey> Possible dupe with CVE-1999-1185. | View |
1314 | CVE-1999-1334 | Candidate | Multiple buffer overflows in filter command in Elm 2.4 allows attackers to execute arbitrary commands via (1) long From: headers, (2) long Reply-To: headers, or (3) via a long -f (filterfile) command line argument. | Proposed (20010912) | ACCEPT(3) Cole, Foat, Stracener | MODIFY(1) Frech | NOOP(2) Armstrong, Wall | Frech> XF:elm-filter-getfilterrules-bo(7214) | XF:elm-filter2(711) | View |
1375 | CVE-1999-1395 | Candidate | Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges. | Modified (20091029) | ACCEPT(3) Cole, Foat, Stracener | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:vms-monitor-gain-privileges(7136) | Duplicate of CVE-1999-1056? If not, indicate why in Analysis | comments. | Christey> Note that CVE-1999-1056 | Christey> CVE-1999-1056 is in fact a duplicate. This candidate will | be kept, and CVE-1999-1056 will be REJECTed, because this | candidate has more references. | View |
1395 | CVE-1999-1415 | Candidate | Vulnerability in /usr/bin/mail in DEC ULTRIX before 4.2 allows local users to gain privileges. | Proposed (20010912) | ACCEPT(3) Cole, Foat, Stracener | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:bsd-binmail(515) | CA-1991-13 was superseded by CA-1995-02. | Christey> Is there overlap between CVE-1999-1415 and CVE-1999-1438? | Both CERT advisories are vague. | View |
1446 | CVE-1999-1466 | Candidate | Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the "established" keyword. | Proposed (20010912) | ACCEPT(3) Cole, Foat, Stracener | MODIFY(1) Frech | NOOP(2) Christey, Wall | Frech> XF:cisco-acl-established(1248) | Possible dupe with CVE-1999-0162. | Christey> This is not a dupe with CVE-1999-0162. The Cisco advisory | referenced in CVE-1999-0162 says that affected Cisco versions | are 10.0 through 10.3. This CAN deals with versions 8.2 | through 9.1. In addition, the date of release of | CVE-1999-0162 is June 1995; this CAN was released December | 1992. Both items include clear Cisco acknowledgement with | details, so we should conclude that they are separate | problems, despite the vagueness of the reports. | View |
Page 968 of 20943, showing 5 records out of 104715 total, starting on record 4836, ending on 4840