CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1064 | CVE-1999-1084 | Candidate | The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash. | Proposed (20010912) | ACCEPT(3) Cole, Foat, Wall | MODIFY(1) Frech | Frech> XF:nt-registry-permissions(4111) | View |
1344 | CVE-1999-1364 | Candidate | Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext. | Modified (20020218-01) | ACCEPT(3) Cole, Foat, Wall | MODIFY(1) Frech | Frech> XF:nt-threadcontext-dos(7421) | View |
1023 | CVE-1999-1043 | Candidate | Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error). | Proposed (20010912) | ACCEPT(3) Cole, Foat, Wall | MODIFY(1) Frech | Frech> XF:exchange-dos(1223) | View |
3529 | CVE-2001-0721 | Candidate | Universal Plug and Play (UPnP) in Windows 98, 98SE, ME, and XP allows remote attackers to cause a denial of service (memory consumption or crash) via a malformed UPnP request. | Proposed (20011122) | ACCEPT(3) Cole, Foat, Wall | MODIFY(1) Frech | NOOP(1) Christey | RECAST(3) Armstrong, Baker, Bishop | Bishop> I agree that these should be split, as the abstraction says. | Frech> XF:win-upnp-dos(7428) | Baker> SPLIT | Armstrong> SPLIT | Christey> Consider adding BID:3499 | Christey> CIAC:M-015 | URL:http://www.ciac.org/ciac/bulletins/m-015.shtml | XF:win-upnp-dos(7428) | URL:http://www.iss.net/security_center/static/7428.php | BID:3499 | URL:http://www.securityfocus.com/bid/3499 | View |
3449 | CVE-2001-0636 | Candidate | Buffer overflows in Raytheon SilentRunner allow remote attackers to (1) cause a denial of service in the collector (cle.exe) component of SilentRunner 2.0 via traffic containing long passwords, or (2) execute arbitrary commands via long HTTP queries in the Knowledge Browser component in SilentRunner 2.0 and 2.0.1. NOTE: It is highly likely that this candidate will be split into multiple candidates. | Proposed (20010829) | ACCEPT(3) Cole, Foat, Ziese | MODIFY(1) Frech | NOOP(3) Armstrong, Christey, Wall | RECAST(2) Baker, Bishop | Bishop> please split it into 2 candidates, one for the DoS and one | for the execute part | Frech> XF:silentrunner-collector-popuser-bo(6795) | XF:silentrunner-collector-poppass-bo(6796) | XF:silentrunner-collector-httpurl-bo(6797) | Baker> SPLIT | Christey> Consider adding BID:3150 | Christey> Consider adding BID:3151 | View |
Page 970 of 20943, showing 5 records out of 104715 total, starting on record 4846, ending on 4850