CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In January 2000

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2000-1221 Bypass 2000-01-08 2009-02-28
10.0
Admin Remote Low Not required Complete Complete Complete
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
2 CVE-2000-1220 Exec Code +Priv 2000-01-08 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
3 CVE-2000-1216 Overflow +Priv 2000-01-27 2005-10-20
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine.
4 CVE-2000-0132 200 +Info 2000-01-31 2008-09-10
2.6
None Remote High Not required Partial None None
Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function.
5 CVE-2000-0130 Exec Code Overflow 2000-01-27 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in SCO scohelp program allows remote attackers to execute commands.
6 CVE-2000-0126 2000-01-26 2008-09-10
5.0
None Remote Low Not required Partial None None
Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack.
7 CVE-2000-0120 Bypass 2000-01-01 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
The Remote Access Service invoke.cfm template in Allaire Spectra 1.0 allows users to bypass authentication via the bAuthenticated parameter.
8 CVE-2000-0117 2000-01-30 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root).
9 CVE-2000-0116 Bypass 2000-01-29 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag.
10 CVE-2000-0115 DoS 2000-01-21 2008-09-10
5.0
None Remote Low Not required None None Partial
IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page.
11 CVE-2000-0113 DoS 2000-01-27 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics.
12 CVE-2000-0111 2000-01-29 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions.
13 CVE-2000-0109 2000-01-31 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
The mcsp Client Site Processor system (MultiCSP) in Standard and Poor's ComStock is installed with several accounts that have no passwords or easily guessable default passwords.
14 CVE-2000-0099 Overflow +Priv 2000-01-18 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in UnixWare ppptalk command allows local users to gain privileges via a long prompt argument.
15 CVE-2000-0098 2000-01-26 2008-09-10
5.0
None Remote Low Not required Partial None None
Microsoft Index Server allows remote attackers to determine the real path for a web directory via a request to an Internet Data Query file that does not exist.
16 CVE-2000-0097 2000-01-26 2008-09-10
5.0
None Remote Low Not required Partial None None
The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the "Malformed Hit-Highlighting Argument" vulnerability.
17 CVE-2000-0096 Overflow +Priv 2000-01-26 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command.
18 CVE-2000-0095 2000-01-24 2008-09-10
5.0
None Remote Low Not required None None Partial
The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier.
19 CVE-2000-0093 2000-01-21 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
20 CVE-2000-0092 2000-01-19 2008-09-10
6.2
Admin Local High Not required Complete Complete Complete
The BSD make program allows local users to modify files via a symlink attack when the -j option is being used.
21 CVE-2000-0091 Overflow +Priv 2000-01-21 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in vchkpw/vpopmail POP authentication package allows remote attackers to gain root privileges via a long username or password.
22 CVE-2000-0090 DoS 2000-01-17 2008-09-10
3.6
None Local Low Not required None Partial Partial
VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack.
23 CVE-2000-0088 Exec Code Overflow 2000-01-20 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in the conversion utilities for Japanese, Korean and Chinese Word 5 documents allows an attacker to execute commands, aka the "Malformed Conversion Data" vulnerability.
24 CVE-2000-0087 2000-01-12 2008-09-10
5.0
None Remote Low Not required Partial None None
Netscape Mail Notification (nsnotify) utility in Netscape Communicator uses IMAP without SSL, even if the user has set a preference for Communicator to use an SSL connection, allowing a remote attacker to sniff usernames and passwords in plaintext.
25 CVE-2000-0086 2000-01-18 2008-09-10
5.0
None Remote Low Not required Partial None None
Netopia Timbuktu Pro sends user IDs and passwords in cleartext, which allows remote attackers to obtain them via sniffing.
26 CVE-2000-0085 Exec Code 2000-01-04 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute code via the LOWSRC or DYNRC parameters in the IMG tag.
27 CVE-2000-0084 2000-01-06 2008-09-10
5.0
None Remote Low Not required Partial None None
CuteFTP uses weak encryption to store password information in its tree.dat file.
28 CVE-2000-0082 2000-01-02 2008-09-05
5.0
None Remote Low Not required Partial None None
WebTV email client allows remote attackers to force the client to send email without the user's knowledge via HTML.
29 CVE-2000-0081 Exec Code 2000-01-10 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute the code by using hexadecimal codes to specify the javascript: protocol, e.g. j&#x41;vascript.
30 CVE-2000-0080 2000-01-10 2008-09-10
2.1
None Local Low Not required None Partial None
AIX techlibss allows local users to overwrite files via a symlink attack.
31 CVE-2000-0079 2000-01-18 2008-09-10
7.5
None Remote Low Not required Partial Partial Partial
The W3C CERN httpd HTTP server allows remote attackers to determine the real pathnames of some commands via a request for a nonexistent URL.
32 CVE-2000-0078 +Priv 2000-01-02 2009-03-04
7.2
Admin Local Low Not required Complete Complete Complete
The June 1999 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the awk command.
33 CVE-2000-0077 +Priv 2000-01-02 2009-03-04
7.2
Admin Local Low Not required Complete Complete Complete
The October 1998 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the ps and grep commands.
34 CVE-2000-0075 DoS 2000-01-13 2008-09-10
5.0
None Remote Low Not required None None Partial
Super Mail Transfer Package (SMTP), later called MsgCore, has a memory leak which allows remote attackers to cause a denial of service by repeating multiple HELO, MAIL FROM, RCPT TO, and DATA commands in the same session.
35 CVE-2000-0074 Exec Code 2000-01-11 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
PowerScripts PlusMail CGI program allows remote attackers to execute commands via a password file with improper permissions.
36 CVE-2000-0072 +Priv 2000-01-17 2008-09-10
4.6
None Local Low Not required Partial Partial Partial
Visual Casel (Vcasel) does not properly prevent users from executing files, which allows local users to use a relative pathname to specify an alternate file which has an approved name and possibly gain privileges.
37 CVE-2000-0071 2000-01-11 2008-09-10
5.0
None Remote Low Not required Partial None None
IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions.
38 CVE-2000-0070 +Priv 2000-01-12 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka "Spoofed LPC Port Request."
39 CVE-2000-0069 2000-01-01 2008-09-10
2.1
None Local Low Not required Partial None None
The recover program in Solstice Backup allows local users to restore sensitive files.
40 CVE-2000-0067 2000-01-11 2008-09-10
2.1
None Local Low Not required Partial None None
CyberCash Merchant Connection Kit (MCK) allows local users to modify files via a symlink attack.
41 CVE-2000-0066 2000-01-13 2008-09-10
5.0
None Remote Low Not required Partial None None
WebSite Pro allows remote attackers to determine the real pathname of webdirectories via a malformed URL request.
42 CVE-2000-0065 Exec Code Overflow 2000-01-17 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in InetServ 3.0 allows remote attackers to execute commands via a long GET request.
43 CVE-2000-0064 DoS 2000-01-17 2008-09-10
5.0
None Remote Low Not required None None Partial
cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to cause a denial of service via a malformed URL that includes shell metacharacters.
44 CVE-2000-0063 2000-01-17 2008-09-10
5.0
None Remote Low Not required Partial None None
cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to read arbitrary files by specifying the filename in a parameter to the script.
45 CVE-2000-0062 2000-01-04 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities.
46 CVE-2000-0061 2000-01-07 2008-09-10
10.0
None Remote Low Not required Complete Complete Complete
Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading.
47 CVE-2000-0059 Exec Code 2000-01-04 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands.
48 CVE-2000-0058 2000-01-05 2008-09-10
5.0
None Remote Low Not required Partial None None
Network HotSync program in Handspring Visor does not have authentication, which allows remote attackers to retrieve email and files.
49 CVE-2000-0057 +Info 2000-01-04 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Cold Fusion CFCACHE tag places temporary cache files within the web document root, allowing remote attackers to obtain sensitive system information.
50 CVE-2000-0056 DoS 2000-01-05 2008-09-10
5.0
None Remote Low Not required None None Partial
IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi.
Total number of vulnerabilities : 68   Page : 1 (This Page)2
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.