Latest CVE Feed
-
5.0
MEDIUMCVE-2000-1117
The Extended Control List (ECL) feature of the Java Virtual Machine (JVM) in Lotus Notes Client R5 allows malicious web site operators to determine the existence of files on the client by measuring delays in the execution of the getSystemResource method.... Read more
Affected Products : lotus_notes- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
2.1
LOWCVE-2000-1143
Recourse ManTrap 1.6 hides the first 4 processes that run on a Solaris system, which allows attackers to determine that they are in a honeypot system.... Read more
Affected Products : mantrap- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.2
HIGHCVE-2000-1122
Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument.... Read more
Affected Products : aix- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2000-1177
bb-hist.sh, bb-histlog.sh, bb-hostsvc.sh, bb-rep.sh, bb-replog.sh, and bb-ack.sh in Big Brother (BB) before 1.5d3 allows remote attackers to determine the existence of files and user ID's by specifying the target file in the HISTFILE parameter.... Read more
Affected Products : big_brother_network_monitor- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2000-1184
telnetd in FreeBSD 4.2 and earlier, and possibly other operating systems, allows remote attackers to cause a denial of service by specifying an arbitrary large file in the TERMCAP environmental variable, which consumes resources as the server processes th... Read more
Affected Products : freebsd- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-2000-1136
elvis-tiny before 1.4-10 in Debian GNU/Linux, and possibly other Linux operating systems, allows local users to overwrite files of other users via a symlink attack.... Read more
Affected Products : elvis_tiny- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
3.6
LOWCVE-2000-1156
StarOffice 5.2 follows symlinks and sets world-readable permissions for the /tmp/soffice.tmp directory, which allows a local user to read files of the user who is using StarOffice.... Read more
Affected Products : staroffice- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.2
HIGHCVE-2000-1189
Buffer overflow in pam_localuser PAM module in Red Hat Linux 7.x and 6.x allows attackers to gain privileges.... Read more
Affected Products : linux- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2000-1166
Twig webmail system does not properly set the "vhosts" variable if it is not configured on the site, which allows remote attackers to insert arbitrary PHP (PHP3) code by specifying an alternate vhosts as an argument to the index.php3 program.... Read more
Affected Products : twig- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-2000-1137
GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack.... Read more
- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2000-1182
WatchGuard Firebox II allows remote attackers to cause a denial of service by flooding the Firebox with a large number of FTP or SMTP requests, which disables proxy handling.... Read more
Affected Products : firebox_ii- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2000-1179
Netopia ISDN Router 650-ST before 4.3.5 allows remote attackers to read system logs without authentication by directly connecting to the login screen and typing certain control characters.... Read more
Affected Products : 650-st_isdn_router- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2000-1170
Buffer overflow in Netsnap webcam HTTP server before 1.2.9 allows remote attackers to execute arbitrary commands via a long GET request.... Read more
Affected Products : netsnap- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2000-1161
The installation of AdCycle banner management system leaves the build.cgi program in a web-accessible directory, which allows remote attackers to execute the program and view passwords or delete databases.... Read more
Affected Products : adcycle- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-2000-1145
Recourse ManTrap 1.6 allows attackers who have gained root access to use utilities such as crash or fsdb to read /dev/mem and raw disk devices to identify ManTrap processes or modify arbitrary data files.... Read more
Affected Products : mantrap- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-2000-1147
Buffer overflow in IIS ISAPI .ASP parsing mechanism allows attackers to execute arbitrary commands via a long string to the "LANGUAGE" argument in a script tag.... Read more
Affected Products : internet_information_server- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-2000-1133
Authentix Authentix100 allows remote attackers to bypass authentication by inserting a . (dot) into the URL for a protected directory.... Read more
Affected Products : authentix- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.2
HIGHCVE-2000-1124
Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables.... Read more
Affected Products : aix- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.2
HIGHCVE-2000-1120
Buffer overflow in digest command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands.... Read more
Affected Products : aix- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-2000-1130
McAfee WebShield SMTP 4.5 allows remote attackers to bypass email content filtering rules by including Extended ASCII characters in name of the attachment.... Read more
Affected Products : webshield_smtp- Published: Jan. 09, 2001
- Modified: Apr. 03, 2025