Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 4.6

    MEDIUM
    CVE-2000-0790

    The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a d... Read more

    Affected Products : windows_2000 windows_98 windows_98se
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2000-0791

    Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.... Read more

    Affected Products : secure_linux
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0785

    WircSrv IRC Server 5.07s allows IRC operators to read arbitrary files via the importmotd command, which sets the Message of the Day (MOTD) to the specified file.... Read more

    Affected Products : irc_server
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0676

    Netscape Communicator and Navigator 4.04 through 4.74 allows remote attackers to read arbitrary files by using a Java applet to open a connection to a URL using the "file", "http", "https", and "ftp" protocols, as demonstrated by Brown Orifice.... Read more

    Affected Products : communicator
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0741

    Format string vulnerability in strong.exe program in NAI Net Tools PKI server 1.0 before HotFix 3 allows remote attackers to execute arbitrary code via format strings in a URL with a .XUDA extension.... Read more

    Affected Products : net_tools_pki_server
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0700

    Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force ... Read more

    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-2000-0701

    The wrapper program in mailman 2.0beta3 and 2.0beta4 does not properly cleanse untrusted format strings, which allows local users to gain privileges.... Read more

    Affected Products : mailman linux linux
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0682

    BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /ConsoleHelp/ into the URL, which invokes the FileServlet.... Read more

    Affected Products : weblogic_server
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0711

    Netscape Communicator does not properly prevent a ServerSocket object from being created by untrusted entities, which allows remote attackers to create a server on the victim's system via a malicious applet, as demonstrated by Brown Orifice.... Read more

    Affected Products : communicator virtual_machine
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0712

    Linux Intrusion Detection System (LIDS) 0.9.7 allows local users to gain root privileges when LIDS is disabled via the security=0 boot option.... Read more

    Affected Products : lids
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.6

    HIGH
    CVE-2000-0713

    Buffer overflow in Adobe Acrobat 4.05, Reader, Business Tools, and Fill In products that handle PDF files allows attackers to execute arbitrary commands via a long /Registry or /Ordering specifier.... Read more

    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0690

    Auction Weaver CGI script 1.02 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the fromfile parameter.... Read more

    Affected Products : auction_weaver
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0747

    The logrotate script for OpenLDAP before 1.2.11 in Conectiva Linux sends an improper signal to the kernel log daemon (klogd) and kills it.... Read more

    Affected Products : linux
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0698

    Minicom 1.82.1 and earlier on some Linux systems allows local users to create arbitrary files owned by the uucp user via a symlink attack.... Read more

    Affected Products : minicom
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0699

    Format string vulnerability in ftpd in HP-UX 10.20 allows remote attackers to cause a denial of service or execute arbitrary commands via format strings in the PASS command.... Read more

    Affected Products : hp-ux
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-2000-0681

    Buffer overflow in BEA WebLogic server proxy plugin allows remote attackers to execute arbitrary commands via a long URL with a .JSP extension.... Read more

    Affected Products : weblogic_server
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0688

    Subscribe Me LITE does not properly authenticate attempts to change the administrator password, which allows remote attackers to gain privileges for the Account Manager by directly calling the subscribe.pl script with the setpwd parameter.... Read more

    Affected Products : subscribe_me_lite
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0693

    pgxconfig in the Raptor GFX configuration tool uses a relative path name for a system call to the "cp" program, which allows local users to execute arbitrary commands by modifying their path to point to an alternate "cp" program.... Read more

    Affected Products : raptor_gfx_pgx32
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-2000-0678

    PGP 5.5.x through 6.5.3 does not properly check if an Additional Decryption Key (ADK) is stored in the signed portion of a public certificate, which allows an attacker who can modify a victim's public certificate to decrypt any data that has been encrypte... Read more

    Affected Products : pgp
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-2000-0771

    Microsoft Windows 2000 allows local users to cause a denial of service by corrupting the local security policy via malformed RPC traffic, aka the "Local Security Policy Corruption" vulnerability.... Read more

    Affected Products : windows_2000
    • Published: Oct. 20, 2000
    • Modified: Apr. 03, 2025
Showing 20 of 294724 Results