CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In October 2000

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2000-1214 Overflow +Priv 2000-10-18 2008-09-10
4.6
User Local Low Not required Partial Partial Partial
Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.
2 CVE-2000-1213 2000-10-18 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.
3 CVE-2000-1204 2000-10-13 2008-09-05
5.0
None Remote Low Not required Partial None None
Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.
4 CVE-2000-0816 Exec Code 2000-10-06 2008-09-10
2.1
None Local Low Not required None Partial None
Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters.
5 CVE-2000-0802 2000-10-20 2008-09-05
3.6
None Local Low Not required Partial Partial None
The BAIR program does not properly restrict access to the Internet Explorer Internet options menu, which allows local users to obtain access to the menu by modifying the registry key that starts BAIR.
6 CVE-2000-0801 Overflow +Priv 2000-10-20 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in bdf program in HP-UX 11.00 may allow local users to gain root privileges via a long -t option.
7 CVE-2000-0800 +Priv 2000-10-20 2008-09-10
10.0
Admin Remote Low Not required Complete Complete Complete
String parsing error in rpc.kstatd in the linuxnfs or knfsd packages in SuSE and possibly other Linux systems allows remote attackers to gain root privileges.
8 CVE-2000-0799 +Priv 2000-10-20 2008-09-05
3.7
User Local High Not required Partial Partial Partial
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
9 CVE-2000-0798 2000-10-20 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
10 CVE-2000-0797 Overflow +Priv 2000-10-20 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in gr_osview in IRIX 6.2 and 6.3 allows local users to gain privileges via a long -D option.
11 CVE-2000-0796 Overflow +Priv 2000-10-20 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in dmplay in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long command line option.
12 CVE-2000-0795 Overflow +Priv 2000-10-20 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
13 CVE-2000-0794 Overflow +Priv 2000-10-20 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
Buffer overflow in IRIX libgl.so library allows local users to gain root privileges via a long HOME variable to programs such as (1) gmemusage and (2) gr_osview.
14 CVE-2000-0793 2000-10-20 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
Norton AntiVirus 5.00.01C with the Novell Netware client does not properly restart the auto-protection service after the first user has logged off of the system.
15 CVE-2000-0792 2000-10-20 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Gnome Lokkit firewall package before 0.41 does not properly restrict access to some ports, even if a user does not make any services available.
16 CVE-2000-0791 2000-10-20 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.
17 CVE-2000-0790 2000-10-20 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a default execute option for the first file that is listed in the folder.
18 CVE-2000-0789 +Priv 2000-10-20 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
WinU 5.x and earlier uses weak encryption to store its configuration password, which allows local users to decrypt the password and gain privileges.
19 CVE-2000-0788 Exec Code 2000-10-20 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands.
20 CVE-2000-0787 Exec Code 2000-10-20 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
21 CVE-2000-0786 Bypass 2000-10-20 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
GNU userv 1.0.0 and earlier does not properly perform file descriptor swapping, which can corrupt the USERV_GROUPS and USERV_GIDS environmental variables and allow local users to bypass some access restrictions.
22 CVE-2000-0785 2000-10-20 2008-09-10
5.0
None Remote Low Not required Partial None None
WircSrv IRC Server 5.07s allows IRC operators to read arbitrary files via the importmotd command, which sets the Message of the Day (MOTD) to the specified file.
23 CVE-2000-0784 Exec Code 2000-10-20 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
sshd program in the Rapidstream 2.1 Beta VPN appliance has a hard-coded "rsadmin" account with a null password, which allows remote attackers to execute arbitrary commands via ssh.
24 CVE-2000-0783 DoS 2000-10-20 2008-09-05
5.0
None Remote Low Not required None None Partial
Watchguard Firebox II allows remote attackers to cause a denial of service by sending a malformed URL to the authentication service on port 4100.
25 CVE-2000-0782 2000-10-20 2008-09-05
5.0
None Remote Low Not required Partial None None
netauth.cgi program in Netwin Netauth 4.2e and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.
26 CVE-2000-0781 Exec Code 2000-10-20 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
uagentsetup in ARCServeIT Client Agent 6.62 does not properly check for the existence or ownership of a temporary file which is moved to the agent.cfg configuration file, which allows local users to execute arbitrary commands by modifying the temporary file before it is moved.
27 CVE-2000-0780 2000-10-20 2008-09-05
6.4
None Remote Low Not required Partial Partial None
The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a .. (dot dot) attack.
28 CVE-2000-0779 Bypass 2000-10-20 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Checkpoint Firewall-1 with the RSH/REXEC setting enabled allows remote attackers to bypass access restrictions and connect to a RSH/REXEC client via malformed connection requests.
29 CVE-2000-0778 2000-10-20 2013-08-03
5.0
None Remote Low Not required Partial None None
IIS 5.0 allows remote attackers to obtain source code for .ASP files and other scripts via an HTTP GET request with a "Translate: f" header, aka the "Specialized Header" vulnerability.
30 CVE-2000-0777 2000-10-20 2008-09-05
7.2
None Local Low Not required Complete Complete Complete
The password protection feature of Microsoft Money can store the password in plaintext, which allows attackers with physical access to the system to obtain the password, aka the "Money Password" vulnerability.
31 CVE-2000-0776 Exec Code 2000-10-20 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Mediahouse Statistics Server 5.02x allows remote attackers to execute arbitrary commands via a long HTTP GET request.
32 CVE-2000-0775 DoS Exec Code Overflow 2000-10-20 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in RobTex Viking server earlier than 1.06-370 allows remote attackers to cause a denial of service or execute arbitrary commands via a long HTTP GET request, or long Unless-Modified-Since, If-Range, or If-Modified-Since headers.
33 CVE-2000-0774 2000-10-20 2008-09-05
5.0
None Remote Low Not required Partial None None
The sample Java servlet "test" in Bajie HTTP web server 0.30a reveals the real pathname of the web document root.
34 CVE-2000-0773 Dir. Trav. 2000-10-20 2008-09-05
5.0
None Remote Low Not required Partial None None
Bajie HTTP web server 0.30a allows remote attackers to read arbitrary files via a URL that contains a "....", a variant of the dot dot directory traversal attack.
35 CVE-2000-0772 2000-10-20 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
The installation of Tumbleweed Messaging Management System (MMS) 4.6 and earlier (formerly Worldtalk Worldsecure) creates a default account "sa" with no password.
36 CVE-2000-0771 DoS 2000-10-20 2008-09-05
2.1
None Local Low Not required None None Partial
Microsoft Windows 2000 allows local users to cause a denial of service by corrupting the local security policy via malformed RPC traffic, aka the "Local Security Policy Corruption" vulnerability.
37 CVE-2000-0770 Bypass 2000-10-20 2008-09-05
6.4
None Remote Low Not required Partial Partial None
IIS 4.0 and 5.0 does not properly restrict access to certain types of files when their parent folders have less restrictive permissions, which could allow remote attackers to bypass access restrictions to some files, aka the "File Permission Canonicalization" vulnerability.
38 CVE-2000-0769 2000-10-20 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
O'Reilly WebSite Pro 2.3.7 installs the uploader.exe program with execute permissions for all users, which allows remote attackers to create and execute arbitrary files by directly calling uploader.exe.
39 CVE-2000-0768 2000-10-20 2008-09-05
2.6
None Remote High Not required Partial None None
A function in Internet Explorer 4.x and 5.x does not properly verify the domain of a frame within a browser window, which allows a remote attacker to read client files, aka a variant of the "Frame Domain Verification" vulnerability.
40 CVE-2000-0767 2000-10-20 2008-09-05
2.6
None Remote High Not required Partial None None
The ActiveX control for invoking a scriptlet in Internet Explorer 4.x and 5.x renders arbitrary file types instead of HTML, which allows an attacker to read arbitrary files, aka the "Scriptlet Rendering" vulnerability.
41 CVE-2000-0766 DoS Overflow +Priv 2000-10-20 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in vqSoft vqServer 1.4.49 allows remote attackers to cause a denial of service or possibly gain privileges via a long HTTP GET request.
42 CVE-2000-0765 Exec Code Overflow 2000-10-20 2008-09-05
5.1
User Remote High Not required Partial Partial Partial
Buffer overflow in the HTML interpreter in Microsoft Office 2000 allows an attacker to execute arbitrary commands via a long embedded object tag, aka the "Microsoft Office HTML Object Tag" vulnerability.
43 CVE-2000-0764 DoS 2000-10-20 2008-09-05
5.0
None Remote Low Not required None None Partial
Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed IP packet.
44 CVE-2000-0763 +Priv 2000-10-20 2008-09-05
7.2
Admin Local Low Not required Complete Complete Complete
xlockmore and xlockf do not properly cleanse user-injected format strings, which allows local users to gain root privileges via the -d option.
45 CVE-2000-0762 +Priv 2000-10-20 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
The default installation of eTrust Access Control (formerly SeOS) uses a default encryption key, which allows remote attackers to spoof the eTrust administrator and gain privileges.
46 CVE-2000-0761 DoS 2000-10-20 2008-09-05
5.0
None Remote Low Not required None None Partial
OS2/Warp 4.5 FTP server allows remote attackers to cause a denial of service via a long username.
47 CVE-2000-0760 2000-10-20 2008-09-05
6.4
None Remote Low Not required Partial Partial None
The Snoop servlet in Jakarta Tomcat 3.1 and 3.0 under Apache reveals sensitive system information when a remote attacker requests a nonexistent URL with a .snp extension.
48 CVE-2000-0759 2000-10-20 2008-09-05
6.4
None Remote Low Not required Partial Partial None
Jakarta Tomcat 3.1 under Apache reveals physical path information when a remote attacker requests a URL that does not exist, which generates an error message that includes the physical path.
49 CVE-2000-0758 2000-10-20 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
The web interface for Lyris List Manager 3 and 4 allows list subscribers to obtain administrative access by modifying the value of the list_admin hidden form field.
50 CVE-2000-0757 Exec Code +Priv 2000-10-20 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
The sysgen service in Aptis Totalbill does not perform authentication, which allows remote attackers to gain root privileges by connecting to the service and specifying the commands to be executed.
Total number of vulnerabilities : 136   Page : 1 (This Page)2 3
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.