CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In 2000

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2000-1244 Bypass 2000-12-31 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Computer Associates InoculateIT Agent for Exchange Server does not recognize an e-mail virus attachment if the SMTP header is missing the "From" field, which allows remote attackers to bypass virus protection.
2 CVE-2000-1243 +Info 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
Privacy leak in Dansie Shopping Cart 3.04, and probably earlier versions, sends sensitive information such as user credentials to an e-mail address controlled by the product developers.
3 CVE-2000-1242 2000-12-31 2008-09-05
9.0
Admin Remote Low Single system Complete Complete Complete
The HTTP service in American Power Conversion (APC) PowerChute uses a default username and password, which allows remote attackers to gain system access.
4 CVE-2000-1241 2000-12-31 2009-10-14
10.0
None Remote Low Not required Complete Complete Complete
Unspecified vulnerability in Haakon Nilsen simple, integrated publishing system (SIPS) before 0.2.4 has an unknown impact and attack vectors, related to a "grave security fault."
5 CVE-2000-1240 +Info 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
Unspecified vulnerability in siteman.php3 in AnyPortal(php) before 22 APR 00 allows remote attackers to obtain sensitive information via unknown attack vectors, which reveal the absolute path. NOTE: the provenance of this information is unknown; the details are obtained from third party information.
6 CVE-2000-1239 Bypass 2000-12-31 2008-09-05
9.0
Admin Remote Low Single system Complete Complete Complete
The HTTP interface of Tivoli Lightweight Client Framework (LCF) in IBM Tivoli Management Framework 3.7.1 sets http_disable to zero at install time, which allows remote authenticated users to bypass file permissions on Tivoli Endpoint Configuration data files via an unspecified manipulation of log files.
7 CVE-2000-1238 Bypass 2000-12-31 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
BEA Systems WebLogic Express and WebLogic Server 5.1 SP1-SP6 allows remote attackers to bypass access controls for restricted JSP or servlet pages via a URL with multiple / (forward slash) characters before the restricted pages.
8 CVE-2000-1237 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
The POP3 server in FTGate returns an -ERR code after receiving an invalid USER request, which makes it easier for remote attackers to determine valid usernames and conduct brute force password guessing.
9 CVE-2000-1236 Exec Code Sql 2000-12-31 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
SQL injection vulnerability in mod_sql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allows remote attackers to execute arbitrary SQL commands via the query string of the URL.
10 CVE-2000-1235 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
The default configurations of (1) the port listener and (2) modplsql in Oracle Internet Application Server (IAS) 3.0.7 and earlier allow remote attackers to view privileged database information via HTTP requests for Database Access Descriptor (DAD) files.
11 CVE-2000-1234 2000-12-31 2008-09-05
5.0
None Remote Low Not required None Partial None
violation.php3 in Phorum 3.0.7 allows remote attackers to send e-mails to arbitrary addresses and possibly use Phorum as a "spam proxy" by setting the Mod and ForumName parameters.
12 CVE-2000-1233 Sql 2000-12-31 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
SQL injection vulnerability in read.php3 and other scripts in Phorum 3.0.7 allows remote attackers to execute arbitrary SQL queries via the sSQL parameter.
13 CVE-2000-1232 2000-12-31 2008-09-05
5.0
None Remote Low Not required None Partial None
upgrade.php3 in Phorum 3.0.7 could allow remote attackers to modify certain Phorum database tables via an unknown method.
14 CVE-2000-1231 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
code.php3 in Phorum 3.0.7 allows remote attackers to read arbitrary files in the phorum directory via the query string.
15 CVE-2000-1230 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
Backdoor in auth.php3 in Phorum 3.0.7 allows remote attackers to access restricted web pages via an HTTP request with the PHP_AUTH_USER parameter set to "boogieman".
16 CVE-2000-1229 Dir. Trav. 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
Directory traversal vulnerability in Phorum 3.0.7 allows remote Phorum administrators to read arbitrary files via ".." (dot dot) sequences in the default .langfile name field in the Master Settings administrative function, which causes the file to be displayed in admin.php3.
17 CVE-2000-1228 2000-12-31 2008-09-05
5.0
None Remote Low Not required None Partial None
Phorum 3.0.7 allows remote attackers to change the administrator password without authentication via an HTTP request for admin.php3 that sets step, option, confirm and newPssword variables.
18 CVE-2000-1227 DoS 2000-12-31 2008-09-05
5.0
None Remote Low Not required None None Partial
Windows NT 4.0 and Windows 2000 hosts allow remote attackers to cause a denial of service (unavailable connections) by sending multiple SMB SMBnegprots requests but not reading the response that is sent back.
19 CVE-2000-1226 DoS 2000-12-31 2008-09-05
5.0
None Remote Low Not required None None Partial
Snort 1.6, when running in straight ASCII packet logging mode or IDS mode with straight decoded ASCII packet logging selected, allows remote attackers to cause a denial of service (crash) by sending non-IP protocols that Snort does not know about, as demonstrated by an nmap protocol scan.
20 CVE-2000-1225 2000-12-31 2008-09-05
5.0
None Remote Low Not required Partial None None
Xitami 2.5b installs the testcgi.exe program by default in the cgi-bin directory, which allows remote attackers to gain sensitive configuration information about the web server by accessing the program.
21 CVE-2000-1224 2000-11-23 2008-09-05
5.0
None Remote Low Not required Partial None None
Caucho Technology Resin 1.2 and possibly earlier allows remote attackers to view JSP source via an HTTP request to a .jsp file with certain characters appended to the file name, such as (1) "..", (2) "%2e..", (3) "%81", (4) "%82", and others.
22 CVE-2000-1223 Exec Code 2000-11-20 2008-09-05
7.5
None Remote Low Not required Partial Partial Partial
quikstore.cgi in Quikstore Shopping Cart allows remote attackers to execute arbitrary commands via shell metacharacters in the URL portion of an HTTP GET request.
23 CVE-2000-1222 +Priv 2000-12-10 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
AIX sysback before 4.2.1.13 uses a relative path to find and execute the hostname program, which allows local users to gain privileges by modifying the path to point to a malicious hostname program.
24 CVE-2000-1221 Bypass 2000-01-08 2009-02-28
10.0
Admin Remote Low Not required Complete Complete Complete
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP.
25 CVE-2000-1220 Exec Code +Priv 2000-01-08 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
26 CVE-2000-1219 Overflow 2000-11-01 2008-09-05
7.5
None Remote Low Not required Partial Partial Partial
The -ftrapv compiler option in gcc and g++ 3.3.3 and earlier does not handle all types of integer overflows, which may leave applications vulnerable to vulnerabilities related to overflows.
27 CVE-2000-1218 2000-04-14 2008-09-05
7.5
None Remote Low Not required Partial Partial Partial
The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.
28 CVE-2000-1217 Bypass 2000-11-21 2008-09-05
4.6
None Local Low Not required Partial Partial Partial
Microsoft Windows 2000 before Service Pack 2 (SP2), when running in a non-Windows 2000 domain and using NTLM authentication, and when credentials of an account are locally cached, allows local users to bypass account lockout policies and make an unlimited number of login attempts, aka the "Domain Account Lockout" vulnerability.
29 CVE-2000-1216 Overflow +Priv 2000-01-27 2005-10-20
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine.
30 CVE-2000-1214 Overflow +Priv 2000-10-18 2008-09-10
4.6
User Local Low Not required Partial Partial Partial
Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.
31 CVE-2000-1213 2000-10-18 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.
32 CVE-2000-1212 2000-12-18 2008-09-10
5.0
None Remote Low Not required None Partial None
Zope 2.2.0 through 2.2.4 does not properly protect a data updating method on Image and File objects, which allows attackers with DTML editing privileges to modify the raw data of these objects.
33 CVE-2000-1211 2000-12-16 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Zope 2.2.0 through 2.2.4 does not properly perform security registration for legacy names of object constructors such as DTML method objects, which could allow attackers to perform unauthorized activities.
34 CVE-2000-1207 2000-09-30 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
userhelper in the usermode package on Red Hat Linux executes non-setuid programs as root, which does not activate the security measures in glibc and allows the programs to be exploited via format string vulnerabilities in glibc via the LANG or LC_ALL environment variables (CVE-2000-0844).
35 CVE-2000-1205 79 Exec Code XSS 2000-02-01 2008-09-05
4.3
None Remote Medium Not required None Partial None
Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code. NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache. The printenv.pl/acuparam vector, discloser on 20070724, is one such variant.
36 CVE-2000-1204 2000-10-13 2008-09-05
5.0
None Remote Low Not required Partial None None
Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.
37 CVE-2000-1080 DoS 2000-11-01 2008-09-05
5.0
None Remote Low Not required None None Partial
Quake 1 (quake1) and ProQuake 1.01 and earlier allow remote attackers to cause a denial of service via a malformed (empty) UDP packet.
38 CVE-2000-1079 2000-08-29 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Interactions between the CIFS Browser Protocol and NetBIOS as implemented in Microsoft Windows 95, 98, NT, and 2000 allow remote attackers to modify dynamic NetBIOS name cache entries via a spoofed Browse Frame Request in a unicast or UDP broadcast datagram.
39 CVE-2000-1078 DoS 2000-12-11 2008-09-05
5.0
None Remote Low Not required None None Partial
ICQ Web Front HTTPd allows remote attackers to cause a denial of service by requesting a URL that contains a "?" character.
40 CVE-2000-1077 Exec Code Overflow 2000-12-11 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in the SHTML logging functionality of iPlanet Web Server 4.x allows remote attackers to execute arbitrary commands via a long filename with a .shtml extension.
41 CVE-2000-1076 +Priv 2000-12-11 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
Netscape (iPlanet) Certificate Management System 4.2 and Directory Server 4.12 stores the administrative password in plaintext, which could allow local and possibly remote attackers to gain administrative privileges on the server.
42 CVE-2000-1075 Dir. Trav. 2000-12-11 2008-09-05
5.0
None Remote Low Not required Partial None None
Directory traversal vulnerability in iPlanet Certificate Management System 4.2 and Directory Server 4.12 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the Agent, End Entity, or Administrator services.
43 CVE-2000-1074 +Priv 2000-12-11 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
csstart program in iCal 2.1 Patch 2 uses relative pathnames to install the libsocket and libnsl libraries, which could allow the icsuser account to gain root privileges by creating a Trojan Horse library in the current or parent directory.
44 CVE-2000-1073 +Priv 2000-12-11 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
csstart program in iCal 2.1 Patch 2 searches for the cshttpd program in the current working directory, which allows local users to gain root privileges by creating a Trojan Horse cshttpd program in a directory and calling csstart from that directory.
45 CVE-2000-1072 Exec Code 2000-12-11 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
iCal 2.1 Patch 2 installs many files with world-writeable permissions, which allows local users to modify the iCal configuration and execute arbitrary commands by replacing the iplncal.sh program with a Trojan horse.
46 CVE-2000-1071 +Priv 2000-12-11 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
The GUI installation for iCal 2.1 Patch 2 disables access control for the X server using an "xhost +" command, which allows remote attackers to monitor X Windows events and gain privileges.
47 CVE-2000-1070 2000-12-11 2008-09-05
5.0
None Remote Low Not required Partial None None
pollit.cgi in Poll It 2.01 and earlier uses data files that are located under the web document root, which allows remote attackers to access sensitive or private information.
48 CVE-2000-1069 2000-12-11 2008-09-05
6.4
None Remote Low Not required Partial Partial None
pollit.cgi in Poll It 2.01 and earlier allows remote attackers to access administrative functions without knowing the real password by specifying the same value to the entered_password and admin_password parameters.
49 CVE-2000-1068 Exec Code 2000-12-11 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
pollit.cgi in Poll It 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the poll_options parameter.
50 CVE-2000-1066 DoS 2000-12-11 2008-09-05
5.0
None Remote Low Not required None None Partial
The getnameinfo function in FreeBSD 4.1.1 and earlier, and possibly other operating systems, allows a remote attacker to cause a denial of service via a long DNS hostname.
Total number of vulnerabilities : 1020   Page : 1 (This Page)2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.