Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 7.5

    HIGH
    CVE-2000-0085

    Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute code via the LOWSRC or DYNRC parameters in the IMG tag.... Read more

    Affected Products : hotmail
    • Published: Jan. 04, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0052

    Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.... Read more

    Affected Products : linux mandrake_linux turbolinux
    • Published: Jan. 04, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0062

    The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities.... Read more

    Affected Products : zope
    • Published: Jan. 04, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0051

    The Allaire Spectra Configuration Wizard allows remote attackers to cause a denial of service by repeatedly resubmitting data collections for indexing via a URL.... Read more

    Affected Products : spectra
    • Published: Jan. 04, 2000
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-1999-0735

    KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories.... Read more

    Affected Products : linux k-mail
    • Published: Jan. 04, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0077

    The October 1998 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the ps and grep commands.... Read more

    Affected Products : hp-ux
    • Published: Jan. 02, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0078

    The June 1999 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the awk command.... Read more

    Affected Products : hp-ux
    • Published: Jan. 02, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0082

    WebTV email client allows remote attackers to force the client to send email without the user's knowledge via HTML.... Read more

    Affected Products : webtv
    • Published: Jan. 02, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-1999-0964

    Buffer overflow in FreeBSD setlocale in the libc module allows attackers to execute arbitrary code via a long PATH_LOCALE environment variable.... Read more

    Affected Products : freebsd
    • Published: Jan. 01, 2000
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0120

    The Remote Access Service invoke.cfm template in Allaire Spectra 1.0 allows users to bypass authentication via the bAuthenticated parameter.... Read more

    Affected Products : spectra
    • Published: Jan. 01, 2000
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2000-0069

    The recover program in Solstice Backup allows local users to restore sensitive files.... Read more

    Affected Products : solstice_backup
    • Published: Jan. 01, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0013

    IRIX soundplayer program allows local users to gain privileges by including shell metacharacters in a .wav file, which is executed via the midikeys program.... Read more

    Affected Products : irix
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-1999-1589

    Unspecified vulnerability in crontab in IBM AIX 3.2 allows local users to gain root privileges via unknown attack vectors.... Read more

    Affected Products : aix
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-1512

    The AMaViS virus scanner 0.2.0-pre4 and earlier allows remote attackers to execute arbitrary commands as root via an infected mail message with shell metacharacters in the reply-to field.... Read more

    Affected Products : virus_scanner
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2000-0015

    CascadeView TFTP server allows local users to gain privileges via a symlink attack.... Read more

    Affected Products : cascadeview_ux
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1476

    A bug in Intel Pentium processor (MMX and Overdrive) allows local users to cause a denial of service (hang) in Intel-based operating systems such as Windows NT and Windows 95, via an invalid instruction, aka the "Invalid Operand with Locked CMPXCHG8B Inst... Read more

    Affected Products : pentium pentuim
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-1999-1359

    When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies.... Read more

    Affected Products : windows_nt
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-0154

    IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL.... Read more

    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1362

    Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters.... Read more

    Affected Products : windows_nt
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-1379

    DNS allows remote attackers to use DNS name servers as traffic amplifiers via a UDP DNS query with a spoofed source address, which produces more traffic to the victim than was sent by the attacker.... Read more

    Affected Products : dnstools
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
Showing 20 of 293544 Results