The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.
Max CVSS
9.8
EPSS Score
0.64%
Published
2000-04-14
Updated
2024-02-08
The web administration interface for CommuniGate Pro 3.2.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Max CVSS
5.0
EPSS Score
1.02%
Published
2000-04-03
Updated
2017-10-10
IMP does not remove files properly if the MSWordView application quits, which allows local users to cause a denial of service by filling up the disk space by requesting a large number of documents and prematurely stopping the request.
Max CVSS
5.0
EPSS Score
0.04%
Published
2000-04-22
Updated
2016-10-18
The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows other local users to read potentially sensitive information.
Max CVSS
2.1
EPSS Score
0.05%
Published
2000-04-22
Updated
2016-10-18
A backdoor password in Cart32 3.0 and earlier allows remote attackers to execute arbitrary commands.
Max CVSS
7.5
EPSS Score
2.21%
Published
2000-04-27
Updated
2016-10-18

CVE-2000-0380

Public exploit
The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string.
Max CVSS
7.1
EPSS Score
95.97%
Published
2000-04-26
Updated
2008-09-10
Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka "Stealth Attachment."
Max CVSS
7.5
EPSS Score
1.22%
Published
2000-04-28
Updated
2024-02-02
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-04-29
Updated
2008-09-10
ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules.
Max CVSS
7.5
EPSS Score
2.94%
Published
2000-04-24
Updated
2008-09-10
Concurrent Versions Software (CVS) uses predictable temporary file names for locking, which allows local users to cause a denial of service by creating the lock directory before it is created for use by a legitimate CVS user.
Max CVSS
5.5
EPSS Score
0.04%
Published
2000-04-23
Updated
2024-02-08
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-04-24
Updated
2018-10-30
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-04-21
Updated
2008-09-10
The Allaire Spectra container editor preview tool does not properly enforce object security, which allows an attacker to conduct unauthorized activities via an object-method that is added to the container object with a publishing rule.
Max CVSS
2.1
EPSS Score
0.05%
Published
2000-04-24
Updated
2008-09-10
Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the "Malformed Environment Variable" vulnerability.
Max CVSS
5.0
EPSS Score
0.05%
Published
2000-04-20
Updated
2018-10-12
Meeting Maker uses weak encryption (a polyalphabetic substitution cipher) for passwords, which allows remote attackers to sniff and decrypt passwords for Meeting Maker accounts.
Max CVSS
5.0
EPSS Score
0.32%
Published
2000-04-25
Updated
2008-09-10
pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap.
Max CVSS
5.0
EPSS Score
1.55%
Published
2000-04-25
Updated
2008-09-10

CVE-2000-0322

Public exploit
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
Max CVSS
10.0
EPSS Score
23.67%
Published
2000-04-24
Updated
2016-09-17
Buffer overflow in IC Radius package allows a remote attacker to cause a denial of service via a long user name.
Max CVSS
5.0
EPSS Score
0.25%
Published
2000-04-24
Updated
2008-09-10
Qpopper 2.53 and 3.0 does not properly identify the \n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \n.
Max CVSS
5.0
EPSS Score
0.28%
Published
2000-04-21
Updated
2008-09-10
mail.local in Sendmail 8.10.x does not properly identify the .\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 2047 characters long and ends in .\n.
Max CVSS
5.0
EPSS Score
0.25%
Published
2000-04-23
Updated
2008-09-10
Atrium Mercur Mail Server 3.2 allows local attackers to read other user's email and create arbitrary files via a dot dot (..) attack.
Max CVSS
7.5
EPSS Score
0.31%
Published
2000-04-21
Updated
2008-09-10
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-04-24
Updated
2018-10-30
Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-04-24
Updated
2018-10-30
The Windows 2000 domain controller allows a malicious user to modify Active Directory information by modifying an unprotected attribute, aka the "Mixed Object Access" vulnerability.
Max CVSS
2.1
EPSS Score
0.05%
Published
2000-04-20
Updated
2018-10-12
Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command.
Max CVSS
5.0
EPSS Score
0.22%
Published
2000-04-06
Updated
2016-10-18
79 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!