Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2001-1422

    WinVNC 3.3.3 and earlier generates the same challenge string for multiple connections, which allows remote attackers to bypass VNC authentication by sniffing the challenge and response of other users.... Read more

    Affected Products : winvnc
    • Published: Jan. 23, 2001
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2001-1274

    Buffer overflow in MySQL before 3.23.31 allows attackers to cause a denial of service and possibly gain privileges.... Read more

    Affected Products : mysql
    • Published: Jan. 23, 2001
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2001-1275

    MySQL before 3.23.31 allows users with a MySQL account to use the SHOW GRANTS command to obtain the encrypted administrator password from the mysql.user table and possibly gain privileges via password cracking.... Read more

    Affected Products : mysql
    • Published: Jan. 19, 2001
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2001-1436

    Dallas Semiconductor iButton DS1991 returns predictable values when given an incorrect password, which makes it easier for users with physical access to conduct dictionary attacks against the device password.... Read more

    Affected Products : ibutton
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2001-1476

    SSH before 2.0, with RC4 encryption and the "disallow NULL passwords" option enabled, makes it easier for remote attackers to guess portions of user passwords by replaying user sessions with certain modifications, which trigger different messages dependin... Read more

    Affected Products : ssh
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2001-1475

    SSH before 2.0, when using RC4 and password authentication, allows remote attackers to replay messages until a new server key (VK) is generated.... Read more

    Affected Products : ssh
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2001-1473

    The SSH-1 protocol allows remote servers to conduct man-in-the-middle attacks and replay a client challenge response to a target server by creating a Session ID that matches the Session ID of the target, but which uses a public key pair that is weaker tha... Read more

    Affected Products : ssh
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2001-1474

    SSH before 2.0 disables host key checking when connecting to the localhost, which allows remote attackers to silently redirect connections to the localhost by poisoning the client's DNS cache.... Read more

    Affected Products : ssh
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2001-1470

    The IDEA cipher as implemented by SSH1 does not protect the final block of a message against modification, which allows remote attackers to modify the block without detection by changing its cyclic redundancy check (CRC) to match the modifications to the ... Read more

    Affected Products : ssh
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2001-1469

    The RC4 stream cipher as used by SSH1 allows remote attackers to modify messages without detection by XORing the original message's cyclic redundancy check (CRC) with the CRC of a mask consisting of all the bits of the original message that were modified.... Read more

    Affected Products : ssh
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 5.1

    MEDIUM
    CVE-2001-1416

    Multiple cross-site scripting (XSS) vulnerabilities in the log messages in certain Alpha versions of AOL Instant Messenger (AIM) 4.4 allow remote attackers to execute arbitrary web script or HTML via an image in the (1) DATA, (2) STYLE, or (3) BINARY tags... Read more

    Affected Products : instant_messenger
    • Published: Jan. 18, 2001
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2001-1385

    The Apache module for PHP 4.0.0 through PHP 4.0.4, when disabled with the 'engine = off' option for a virtual host, may disable PHP for other virtual hosts, which could cause Apache to serve the source code of PHP scripts.... Read more

    Affected Products : php mandrake_linux
    • Published: Jan. 12, 2001
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2001-1044

    Basilix Webmail 0.9.7beta, and possibly other versions, stores *.class and *.inc files under the document root and does not restrict access, which could allows remote attackers to obtain sensitive information such as MySQL passwords and usernames from the... Read more

    Affected Products : basilix_webmail
    • Published: Jan. 11, 2001
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2001-1464

    Crystal Reports, when displaying data for a password protected database using HTML pages, embeds the username and password in cleartext in the HTML page and the URL, which allows remote attackers to obtain passwords.... Read more

    Affected Products : crystal_reports
    • Published: Jan. 10, 2001
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-1171

    Directory traversal vulnerability in cgiforum.pl script in CGIForum 1.0 allows remote attackers to ready arbitrary files via a .. (dot dot) attack in the "thesection" parameter.... Read more

    Affected Products : cgiforum
    • Published: Jan. 09, 2001
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-1174

    Multiple buffer overflows in AFS ACL parser for Ethereal 0.8.13 and earlier allows remote attackers to execute arbitrary commands via a packet with a long username.... Read more

    Affected Products : ethereal
    • Published: Jan. 09, 2001
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-1117

    The Extended Control List (ECL) feature of the Java Virtual Machine (JVM) in Lotus Notes Client R5 allows malicious web site operators to determine the existence of files on the client by measuring delays in the execution of the getSystemResource method.... Read more

    Affected Products : lotus_notes
    • Published: Jan. 09, 2001
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2000-1143

    Recourse ManTrap 1.6 hides the first 4 processes that run on a Solaris system, which allows attackers to determine that they are in a honeypot system.... Read more

    Affected Products : mantrap
    • Published: Jan. 09, 2001
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-1122

    Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument.... Read more

    Affected Products : aix
    • Published: Jan. 09, 2001
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-1177

    bb-hist.sh, bb-histlog.sh, bb-hostsvc.sh, bb-rep.sh, bb-replog.sh, and bb-ack.sh in Big Brother (BB) before 1.5d3 allows remote attackers to determine the existence of files and user ID's by specifying the target file in the HISTFILE parameter.... Read more

    Affected Products : big_brother_network_monitor
    • Published: Jan. 09, 2001
    • Modified: Apr. 03, 2025
Showing 20 of 294522 Results