CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 139301 CVEs

CVE ID Severity Description EPSS Published
N/A

The web interface server in HP Web JetAdmin 5.6 allows remote attackers to read arbitrary files via a .. (dot dot) attack.

4.4% 2000-05-24
N/A

Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command.

4.0% 2000-05-24
N/A

Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems.

0.5% 2000-05-24
N/A

Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name.

0.7% 2000-05-24
N/A

Buffer overflow in wconsole.dll in Rockliffe MailSite Management Agent allows remote attackers to execute arbitrary commands via a long query_string parameter in the HTTP GET request.

1.8% 2000-05-24
N/A

The add.exe program in the Carello shopping cart software allows remote attackers to duplicate files on the server, which could allow the attacker to read source code for web scripts such as .ASP files.

3.6% 2000-05-24
N/A

The file transfer mechanism in Danware NetOp 6.0 does not provide authentication, which allows remote attackers to access and modify arbitrary files.

0.7% 2000-05-23
N/A

The Cayman 3220-H DSL router allows remote attackers to cause a denial of service via oversized ICMP echo (ping) requests.

6.0% 2000-05-23
N/A

Buffer overflow in fdmount on Linux systems allows local users in the "floppy" group to execute arbitrary commands via a long mountpoint parameter.

0.4% 2000-05-22
N/A

Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files.

0.4% 2000-05-22
N/A

The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets.

4.0% 2000-05-19
N/A

MetaProducts Offline Explorer 1.2 and earlier allows remote attackers to access arbitrary files via a .. (dot dot) attack.

3.8% 2000-05-19
N/A

Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the "IP Fragment Reassembly" vulnerability.

41.0% 2000-05-19
N/A

BeOS 5.0 allows remote attackers to cause a denial of service via fragmented TCP packets.

6.0% 2000-05-18
N/A

XFree86 3.3.x and 4.0 allows a user to cause a denial of service via a negative counter value in a malformed TCP packet that is sent to port 6000.

5.8% 2000-05-18
N/A

Buffer overflow in the ESMTP service of Lotus Domino Server 5.0.1 allows remote attackers to cause a denial of service via a long MAIL FROM command.

4.1% 2000-05-18
N/A

Vulnerability in bbd server in Big Brother System and Network Monitor allows an attacker to execute arbitrary commands.

0.9% 2000-05-18
N/A

Buffer overflow in the CyberPatrol daemon "cyberdaemon" used in gauntlet and WebShield allows remote attackers to cause a denial of service or execute arbitrary commands.

7.2% 2000-05-18
N/A

NetProwler 3.0 allows remote attackers to cause a denial of service by sending malformed IP packets that trigger NetProwler's Man-in-the-Middle signature.

13.8% 2000-05-18
N/A

Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files via the frame, aka the "Frame Domain Verification" vulnerability.

23.7% 2000-05-17
N/A

Internet Explorer 4.x and 5.x allows remote attackers to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the "Malformed Component Attribute" vulnerability.

15.1% 2000-05-17
N/A

The HTTP administration interface to the Cayman 3220-H DSL router allows remote attackers to cause a denial of service via a long username or password.

6.3% 2000-05-17
N/A

A debugging feature in NetworkICE ICEcap 2.0.23 and earlier is enabled, which allows a remote attacker to bypass the weak authentication and post unencrypted events.

4.6% 2000-05-17
N/A

xsoldier program allows local users to gain root access via a long argument.

0.3% 2000-05-17
N/A

The calender.pl and the calendar_admin.pl calendar scripts by Matt Kruse allow remote attackers to execute arbitrary commands via shell metacharacters.

5.4% 2000-05-16
N/A

Buffer overflow in L0pht AntiSniff allows remote attackers to execute arbitrary commands via a malformed DNS response packet.

11.9% 2000-05-16
N/A

Buffer overflow in CProxy 3.3 allows remote users to cause a denial of service via a long HTTP request.

8.4% 2000-05-16
N/A

The KDE kscd program does not drop privileges when executing a program specified in a user's SHELL environmental variable, which allows the user to gain privileges by specifying an alternate program to execute.

1.5% 2000-05-16
N/A

Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges.

0.1% 2000-05-16
N/A

Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges.

8.5% 2000-05-16
N/A

Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges.

8.5% 2000-05-16
N/A

Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.

11.0% 2000-05-16
N/A

The Netopia R9100 router does not prevent authenticated users from modifying SNMP tables, even if the administrator has configured it to do so.

0.5% 2000-05-16
N/A

Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request.

24.5% 2000-05-16
N/A

The CGI counter 4.0.7 by George Burgyan allows remote attackers to execute arbitrary commands via shell metacharacters.

5.4% 2000-05-15
N/A

The EMURL web-based email account software encodes predictable identifiers in user session URLs, which allows a remote attacker to access a user's email account.

3.6% 2000-05-15
N/A

The allmanageup.pl file upload CGI script in the Allmanage Website administration software 2.6 can be called directly by remote attackers, which allows them to modify user accounts or web pages.

0.8% 2000-05-13
N/A

The administrative password for the Allmanage web site administration software is stored in plaintext in a file which could be accessed by remote attackers.

0.8% 2000-05-13
N/A

The Microsoft Active Movie ActiveX Control in Internet Explorer 5 does not restrict which file types can be downloaded, which allows an attacker to download any type of file to a user's system by encoding it within an email message or news post.

16.3% 2000-05-13
N/A

Buffer overflow in Outlook Express 4.x allows attackers to cause a denial of service via a mail or news message that has a .jpg or .bmp attachment with a long file name.

11.7% 2000-05-12
N/A

Buffer overflow in Solaris netpr program allows local users to execute arbitrary commands via a long -p option.

0.2% 2000-05-12
N/A

ISM.DLL in IIS 4.0 and 5.0 allows remote attackers to read file contents by requesting the file and appending a large number of encoded spaces (%20) and terminated with a .htr extension, aka the ".HTR File Fragment Reading" or "File Fragment Reading via .HTR" vulnerability.

84.4% 2000-05-11
N/A

Internet Explorer 4.0 and 5.0 allows a malicious web site to obtain client cookies from another domain by including that domain name and escaped characters in a URL, aka the "Unauthorized Cookie Access" vulnerability.

14.8% 2000-05-11
N/A

The process_bug.cgi script in Bugzilla allows remote attackers to execute arbitrary commands via shell metacharacters.

1.1% 2000-05-11
N/A

The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.

0.5% 2000-05-11
N/A

The Office 2000 UA ActiveX Control is marked as "safe for scripting," which allows remote attackers to conduct unauthorized activities via the "Show Me" function in Office Help, aka the "Office 2000 UA Control" vulnerability.

10.9% 2000-05-11
N/A

NTMail 5.x allows network users to bypass the NTMail proxy restrictions by redirecting their requests to NTMail's web configuration server.

16.2% 2000-05-11
N/A

IIS 4.05 and 5.0 allow remote attackers to cause a denial of service via a long, complex URL that appears to contain a large number of file extensions, aka the "Malformed Extension Data in URL" vulnerability.

74.0% 2000-05-11
N/A

Matt Wright's FormMail CGI script allows remote attackers to obtain environmental variables via the env_report parameter.

4.5% 2000-05-10
N/A

ColdFusion Server 4.5.1 allows remote attackers to cause a denial of service by making repeated requests to a CFCACHE tagged cache file that is not stored in memory.

0.8% 2000-05-10