CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 139301 CVEs

CVE ID Severity Description EPSS Published
N/A

Buffer overflow in IC Radius package allows a remote attacker to cause a denial of service via a long user name.

0.6% 2000-04-24
N/A

Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.

0.1% 2000-04-24
N/A

Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option.

0.1% 2000-04-24
N/A

The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands.

75.3% 2000-04-24
5.5 MEDIUM

Concurrent Versions Software (CVS) uses predictable temporary file names for locking, which allows local users to cause a denial of service by creating the lock directory before it is created for use by a legitimate CVS user.

1.3% 2000-04-23
N/A

mail.local in Sendmail 8.10.x does not properly identify the .\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 2047 characters long and ends in .\n.

0.7% 2000-04-23
N/A

IMP does not remove files properly if the MSWordView application quits, which allows local users to cause a denial of service by filling up the disk space by requesting a large number of documents and prematurely stopping the request.

0.4% 2000-04-22
N/A

The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows other local users to read potentially sensitive information.

0.1% 2000-04-22
N/A

Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.

0.1% 2000-04-21
N/A

Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n.

0.7% 2000-04-21
N/A

Atrium Mercur Mail Server 3.2 allows local attackers to read other user's email and create arbitrary files via a dot dot (..) attack.

0.4% 2000-04-21
N/A

Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command.

6.6% 2000-04-21
N/A

Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the "Malformed Environment Variable" vulnerability.

17.2% 2000-04-20
N/A

The Windows 2000 domain controller allows a malicious user to modify Active Directory information by modifying an unprotected attribute, aka the "Mixed Object Access" vulnerability.

0.7% 2000-04-20
N/A

RealNetworks RealServer allows remote attackers to cause a denial of service by sending malformed input to the server at port 7070.

8.5% 2000-04-20
N/A

Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot.

0.7% 2000-04-20
N/A

Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.

0.3% 2000-04-20
N/A

The Adtran MX2800 M13 Multiplexer allows remote attackers to cause a denial of service via a ping flood to the Ethernet interface, which causes the device to crash.

0.7% 2000-04-19
N/A

Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long URL.

15.0% 2000-04-19
N/A

Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the "Server-Side Image Map Components" vulnerability.

21.6% 2000-04-19
N/A

read-passwd and other Lisp functions in Emacs 20 do not properly clear the history of recently typed keys, which allows an attacker to read unencrypted passwords.

0.1% 2000-04-18
N/A

The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack.

0.1% 2000-04-18
N/A

Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess.

0.1% 2000-04-18
N/A

Internet Explorer 5.01 allows remote attackers to bypass the cross frame security policy via a malicious applet that interacts with the Java JSObject to modify the DOM properties to set the IFRAME to an arbitrary Javascript URL.

1.8% 2000-04-18
N/A

HP asecure creates the Audio Security File audio.sec with insecure permissions, which allows local users to cause a denial of service or gain additional privileges.

0.1% 2000-04-18
N/A

Panda Security 3.0 allows users to uninstall the Panda software via its Add/Remove Programs applet.

0.1% 2000-04-17
N/A

Panda Security 3.0 with registry editing disabled allows users to edit the registry and gain privileges by directly executing a .reg file or using other methods.

0.6% 2000-04-17
N/A

Buffer overflow in Star Office 5.1 allows attackers to cause a denial of service by embedding a long URL within a document.

0.1% 2000-04-16
N/A

X fontserver xfs allows local users to cause a denial of service via malformed input to the server.

0.5% 2000-04-16
N/A

Buffer overflow in XFree86 3.3.x allows local users to execute arbitrary commands via a long -xkbmap parameter.

0.0% 2000-04-16
N/A

Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.

78.7% 2000-04-16
N/A

The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request.

0.5% 2000-04-16
9.8 CRITICAL

The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.

2.2% 2000-04-14
N/A

Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0 allows users to cause a denial of service or execute commands, aka the "Link View Server-Side Component" vulnerability.

15.0% 2000-04-14
N/A

The dansie shopping cart application cart.pl allows remote attackers to obtain the shopping cart database and configuration information via a URL that references either the env, db, or vars form variables.

3.6% 2000-04-14
N/A

The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.

0.2% 2000-04-14
N/A

Infonautics getdoc.cgi allows remote attackers to bypass the payment phase for accessing documents via a modified form variable.

0.3% 2000-04-12
N/A

The BizDB CGI script bizdb-search.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the dbname parameter.

5.4% 2000-04-12
N/A

The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon.

0.7% 2000-04-12
N/A

TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webplus CGI program.

8.8% 2000-04-12
N/A

The AVM KEN! ISDN Proxy server allows remote attackers to cause a denial of service via a malformed request.

4.2% 2000-04-12
N/A

The AVM KEN! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

0.7% 2000-04-12
N/A

The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users.

0.4% 2000-04-12
7.5 HIGH

IIS 4.0 and 5.0 allows remote attackers to cause a denial of service by sending many URLs with a large number of escaped characters, aka the "Myriad Escaped Characters" Vulnerability.

20.3% 2000-04-12
N/A

The dansie shopping cart application cart.pl allows remote attackers to modify sensitive purchase information via hidden form fields.

1.1% 2000-04-11
N/A

The dansie shopping cart application cart.pl allows remote attackers to execute commands via a shell metacharacters in a form variable.

1.5% 2000-04-11
N/A

The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.

0.5% 2000-04-11
N/A

After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.

0.8% 2000-04-11
N/A

The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.

0.5% 2000-04-11
N/A

The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.

0.6% 2000-04-11