Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.2

    HIGH
    CVE-2000-0693

    pgxconfig in the Raptor GFX configuration tool uses a relative path name for a system call to the "cp" program, which allows local users to execute arbitrary commands by modifying their path to point to an alternate "cp" program.... Read more

    Affected Products : raptor_gfx_pgx32
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0688

    Subscribe Me LITE does not properly authenticate attempts to change the administrator password, which allows remote attackers to gain privileges for the Account Manager by directly calling the subscribe.pl script with the setpwd parameter.... Read more

    Affected Products : subscribe_me_lite
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2000-0737

    The Service Control Manager (SCM) in Windows 2000 creates predictable named pipes, which allows a local user with console access to gain administrator privileges, aka the "Service Control Manager Named Pipe Impersonation" vulnerability.... Read more

    Affected Products : windows_2000
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0681

    Buffer overflow in BEA WebLogic server proxy plugin allows remote attackers to execute arbitrary commands via a long URL with a .JSP extension.... Read more

    Affected Products : weblogic_server
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 3.7

    LOW
    CVE-2000-0799

    inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.... Read more

    Affected Products : irix
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0757

    The sysgen service in Aptis Totalbill does not perform authentication, which allows remote attackers to gain root privileges by connecting to the service and specifying the commands to be executed.... Read more

    Affected Products : totalbill
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0702

    The net.init rc script in HP-UX 11.00 (S008net.init) allows local users to overwrite arbitrary files via a symlink attack that points from /tmp/stcp.conf to the targeted file.... Read more

    Affected Products : hp-ux
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0677

    Buffer overflow in IBM Net.Data db2www CGI program allows remote attackers to execute arbitrary commands via a long PATH_INFO environmental variable.... Read more

    Affected Products : net.data
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 3.6

    LOW
    CVE-2000-0802

    The BAIR program does not properly restrict access to the Internet Explorer Internet options menu, which allows local users to obtain access to the menu by modifying the registry key that starts BAIR.... Read more

    Affected Products : personal_privacy
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2000-0790

    The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a d... Read more

    Affected Products : windows_2000 windows_98 windows_98se
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0792

    Gnome Lokkit firewall package before 0.41 does not properly restrict access to some ports, even if a user does not make any services available.... Read more

    Affected Products : gnome-lokkit
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0779

    Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.... Read more

    Affected Products : firewall-1
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2000-0755

    Vulnerability in the newgrp command in HP-UX 11.00 allows local users to gain privileges.... Read more

    Affected Products : openview_network_node_manager
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0731

    Directory traversal vulnerability in Worm HTTP server allows remote attackers to read arbitrary files via a .. (dot dot) attack.... Read more

    Affected Products : worm_webserver
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0740

    Buffer overflow in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote attackers to execute arbitrary commands via a long URL in the HTTPS port.... Read more

    Affected Products : net_tools_pki_server
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2000-0789

    WinU 5.x and earlier uses weak encryption to store its configuration password, which allows local users to decrypt the password and gain privileges.... Read more

    Affected Products : winu
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0686

    Auction Weaver CGI script 1.03 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack in the fromfile parameter.... Read more

    Affected Products : auction_weaver
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0680

    The CVS 1.10.8 server does not properly restrict users from creating arbitrary Checkin.prog or Update.prog programs, which allows remote CVS committers to modify or create Trojan horse programs with the Checkin.prog or Update.prog names, then performing a... Read more

    Affected Products : cvs
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0706

    Buffer overflows in ntop running in web mode allows remote attackers to execute arbitrary commands.... Read more

    Affected Products : ntop
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 6.2

    MEDIUM
    CVE-2000-0031

    The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack.... Read more

    Affected Products : linux
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
Showing 20 of 293640 Results