CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 138729 CVEs

CVE ID Severity Description EPSS Published
N/A

Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess.

0.1% 2000-04-18
N/A

Internet Explorer 5.01 allows remote attackers to bypass the cross frame security policy via a malicious applet that interacts with the Java JSObject to modify the DOM properties to set the IFRAME to an arbitrary Javascript URL.

1.8% 2000-04-18
N/A

HP asecure creates the Audio Security File audio.sec with insecure permissions, which allows local users to cause a denial of service or gain additional privileges.

0.1% 2000-04-18
N/A

Panda Security 3.0 allows users to uninstall the Panda software via its Add/Remove Programs applet.

0.1% 2000-04-17
N/A

Panda Security 3.0 with registry editing disabled allows users to edit the registry and gain privileges by directly executing a .reg file or using other methods.

0.6% 2000-04-17
N/A

Buffer overflow in Star Office 5.1 allows attackers to cause a denial of service by embedding a long URL within a document.

0.1% 2000-04-16
N/A

X fontserver xfs allows local users to cause a denial of service via malformed input to the server.

0.5% 2000-04-16
N/A

Buffer overflow in XFree86 3.3.x allows local users to execute arbitrary commands via a long -xkbmap parameter.

0.0% 2000-04-16
N/A

Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.

78.7% 2000-04-16
N/A

The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request.

0.5% 2000-04-16
9.8 CRITICAL

The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache.

2.2% 2000-04-14
N/A

Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0 allows users to cause a denial of service or execute commands, aka the "Link View Server-Side Component" vulnerability.

15.0% 2000-04-14
N/A

The dansie shopping cart application cart.pl allows remote attackers to obtain the shopping cart database and configuration information via a URL that references either the env, db, or vars form variables.

3.6% 2000-04-14
N/A

The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.

0.2% 2000-04-14
N/A

Infonautics getdoc.cgi allows remote attackers to bypass the payment phase for accessing documents via a modified form variable.

0.3% 2000-04-12
N/A

The BizDB CGI script bizdb-search.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the dbname parameter.

5.4% 2000-04-12
N/A

The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon.

0.7% 2000-04-12
N/A

TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webplus CGI program.

8.8% 2000-04-12
N/A

The AVM KEN! ISDN Proxy server allows remote attackers to cause a denial of service via a malformed request.

4.2% 2000-04-12
N/A

The AVM KEN! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

0.7% 2000-04-12
N/A

The default permissions for the Cryptography\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users.

0.4% 2000-04-12
7.5 HIGH

IIS 4.0 and 5.0 allows remote attackers to cause a denial of service by sending many URLs with a large number of escaped characters, aka the "Myriad Escaped Characters" Vulnerability.

20.3% 2000-04-12
N/A

The dansie shopping cart application cart.pl allows remote attackers to modify sensitive purchase information via hidden form fields.

1.1% 2000-04-11
N/A

The dansie shopping cart application cart.pl allows remote attackers to execute commands via a shell metacharacters in a form variable.

1.5% 2000-04-11
N/A

The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed.

0.5% 2000-04-11
N/A

After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.

0.8% 2000-04-11
N/A

The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.

0.5% 2000-04-11
N/A

The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.

0.6% 2000-04-11
N/A

Buffer overflow in healthd for FreeBSD allows local users to gain root privileges.

0.1% 2000-04-10
N/A

BeOS 4.5 and 5.0 allow local users to cause a denial of service via malformed direct system calls using interrupt 37.

0.2% 2000-04-10
N/A

CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN.

0.3% 2000-04-10
N/A

The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name.

0.8% 2000-04-10
N/A

PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt.

0.9% 2000-04-09
N/A

The unattended installation of Windows 2000 with the OEMPreinstall option sets insecure permissions for the All Users and Default Users directories.

1.2% 2000-04-07
N/A

BeOS allows remote attackers to cause a denial of service via malformed packets whose length field is less than the length of the headers.

4.2% 2000-04-07
N/A

Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command.

1.6% 2000-04-06
N/A

The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.

1.4% 2000-04-06
N/A

HP-UX 11.04 VirtualVault (VVOS) sends data to unprivileged processes via an interface that has multiple aliased IP addresses.

1.4% 2000-04-06
N/A

The Nbase-Xyplex EdgeBlaster router allows remote attackers to cause a denial of service via a scan for the FormMail CGI program.

0.7% 2000-04-05
N/A

Buffer overflow in WebObjects.exe in the WebObjects Developer 4.5 package allows remote attackers to cause a denial of service via an HTTP request with long headers such as Accept.

4.0% 2000-04-04
N/A

The web administration interface for CommuniGate Pro 3.2.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.

7.6% 2000-04-03
N/A

Allaire Forums 2.0.5 allows remote attackers to bypass access restrictions to secure conferences via the rightAccessAllForums or rightModerateAllForums variables.

0.4% 2000-04-03
N/A

Buffer overflow in the RealNetworks RealPlayer client versions 6 and 7 allows remote attackers to cause a denial of service via a long Location URL.

3.5% 2000-04-03
N/A

Microsoft Excel 97 and 2000 does not warn the user when executing Excel Macro Language (XLM) macros in external text files, which could allow an attacker to execute a macro virus, aka the "XLM Text Macro" vulnerability.

1.7% 2000-04-03
N/A

A remote attacker can read information from a Netscape user's cache via JavaScript.

0.4% 2000-04-01
N/A

Microsoft Index Server allows remote attackers to view the source code of ASP files by appending a %20 to the filename in the CiWebHitsFile argument to the null.htw URL.

74.4% 2000-03-31
N/A

fcheck allows local users to gain privileges by embedding shell metacharacters into file names that are processed by fcheck.

0.1% 2000-03-31
N/A

Buffer overflow in Webstar HTTP server allows remote attackers to cause a denial of service via a long GET request.

0.7% 2000-03-31
N/A

The default configuration of Cobalt RaQ2 and RaQ3 as specified in access.conf allows remote attackers to view sensitive contents of a .htaccess file.

3.9% 2000-03-31
N/A

IIS 4.0 and 5.0 does not properly perform ISAPI extension processing if a virtual directory is mapped to a UNC share, which allows remote attackers to read the source code of ASP and other files, aka the "Virtualized UNC Share" vulnerability.

83.6% 2000-03-30