CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register   Reset Password   Activate Account
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In July 2000

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2000-0675 Exec Code Overflow 2000-07-13 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in Infopulse Gatekeeper 3.5 and earlier allows remote attackers to execute arbitrary commands via a long string.
2 CVE-2000-0674 2000-07-12 2008-09-05
5.0
None Remote Low Not required Partial None None
ftp.pl CGI program for Virtual Visions FTP browser allows remote attackers to read directories outside of the document root via a .. (dot dot) attack.
3 CVE-2000-0673 DoS 2000-07-27 2008-09-05
5.0
None Remote Low Not required None None Partial
The NetBIOS Name Server (NBNS) protocol does not perform authentication, which allows remote attackers to cause a denial of service by sending a spoofed Name Conflict or Name Release datagram, aka the "NetBIOS Name Server Protocol Spoofing" vulnerability.
4 CVE-2000-0672 2000-07-20 2008-09-10
5.0
None Remote Low Not required Partial None None
The default configuration of Jakarta Tomcat does not restrict access to the /admin context, which allows remote attackers to read arbitrary files by directly calling the administrative servlets to add a context for the root directory.
5 CVE-2000-0671 Bypass 2000-07-21 2008-09-10
5.0
None Remote Low Not required Partial None None
Roxen web server earlier than 2.0.69 allows allows remote attackers to bypass access restrictions, list directory contents, and read source code by inserting a null character (%00) to the URL.
6 CVE-2000-0670 Exec Code 2000-07-12 2008-09-10
7.2
Admin Local Low Not required Complete Complete Complete
The cvsweb CGI script in CVSWeb 1.80 allows remote attackers with write access to a CVS repository to execute arbitrary commands via shell metacharacters.
7 CVE-2000-0669 DoS 2000-07-11 2008-09-10
5.0
None Remote Low Not required None None Partial
Novell NetWare 5.0 allows remote attackers to cause a denial of service by flooding port 40193 with random data.
8 CVE-2000-0668 2000-07-27 2008-09-10
5.0
None Remote Low Not required None None Partial
pam_console PAM module in Linux systems allows a user to access the system console and reboot the system when a display manager such as gdm or kdm has XDMCP enabled.
9 CVE-2000-0667 DoS 2000-07-27 2008-09-10
3.6
None Local Low Not required None Partial Partial
Vulnerability in gpm in Caldera Linux allows local users to delete arbitrary files or conduct a denial of service.
10 CVE-2000-0666 +Priv 2000-07-16 2008-09-05
10.0
Admin Remote Low Not required Complete Complete Complete
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
11 CVE-2000-0665 DoS 2000-07-17 2008-09-05
5.0
None Remote Low Not required None None Partial
GAMSoft TelSrv telnet server 1.5 and earlier allows remote attackers to cause a denial of service via a long username.
12 CVE-2000-0664 2000-07-26 2008-09-10
5.0
None Remote Low Not required Partial None None
AnalogX SimpleServer:WWW 1.06 and earlier allows remote attackers to read arbitrary files via a modified .. (dot dot) attack that uses the %2E URL encoding for the dots.
13 CVE-2000-0663 Exec Code 2000-07-25 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
The registry entry for the Windows Shell executable (Explorer.exe) in Windows NT and Windows 2000 uses a relative path name, which allows local users to execute arbitrary commands by inserting a Trojan Horse named Explorer.exe into the %Systemdrive% directory, aka the "Relative Shell Path" vulnerability.
14 CVE-2000-0662 2000-07-14 2008-09-10
5.0
None Remote Low Not required Partial None None
Internet Explorer 5.x and Microsoft Outlook allows remote attackers to read arbitrary files by redirecting the contents of an IFRAME using the DHTML Edit Control (DHTMLED).
15 CVE-2000-0661 DoS 2000-07-10 2008-09-05
5.0
None Remote Low Not required None None Partial
WircSrv IRC Server 5.07s allows remote attackers to cause a denial of service via a long string to the server port.
16 CVE-2000-0660 2000-07-12 2008-09-05
5.0
None Remote Low Not required Partial None None
The WDaemon web server for WorldClient 2.1 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
17 CVE-2000-0659 DoS Overflow 2000-07-25 2008-09-10
5.0
None Remote Low Not required None None Partial
Buffer overflow in AnalogX proxy server 4.04 and earlier allows remote attackers to cause a denial of service via a long user ID in a SOCKS4 CONNECT request.
18 CVE-2000-0658 DoS Overflow 2000-07-25 2008-09-10
5.0
None Remote Low Not required None None Partial
Buffer overflow in AnalogX proxy server 4.04 and earlier allows remote attackers to cause a denial of service via a long USER command in the POP3 protocol.
19 CVE-2000-0657 DoS Overflow 2000-07-25 2008-09-05
5.0
None Remote Low Not required None None Partial
Buffer overflow in AnalogX proxy server 4.04 and earlier allows remote attackers to cause a denial of service via a long HELO command in the SMTP protocol.
20 CVE-2000-0656 DoS Overflow 2000-07-25 2008-09-10
5.0
None Remote Low Not required None None Partial
Buffer overflow in AnalogX proxy server 4.04 and earlier allows remote attackers to cause a denial of service via a long USER command in the FTP protocol.
21 CVE-2000-0655 DoS Exec Code 2000-07-25 2008-09-10
5.0
None Remote Low Not required None None Partial
Netscape Communicator 4.73 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a JPEG image containing a comment with an illegal field length of 1.
22 CVE-2000-0654 2000-07-11 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Microsoft Enterprise Manager allows local users to obtain database passwords via the Data Transformation Service (DTS) package Registered Servers Dialog dialog, aka a variant of the "DTS Password" vulnerability.
23 CVE-2000-0653 2000-07-20 2008-09-10
5.0
None Remote Low Not required Partial None None
Microsoft Outlook Express allows remote attackers to monitor a user's email by creating a persistent browser link to the Outlook Express windows, aka the "Persistent Mail-Browser Link" vulnerability.
24 CVE-2000-0652 2000-07-24 2008-09-10
5.0
None Remote Low Not required Partial None None
IBM WebSphere allows remote attackers to read source code for executable web files by directly calling the default InvokerServlet using a URL which contains the "/servlet/file" string.
25 CVE-2000-0651 2000-07-07 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
The ClientTrust program in Novell BorderManager does not properly verify the origin of authentication requests, which could allow remote attackers to impersonate another user by replaying the authentication requests and responses from port 3024 of the victim's machine.
26 CVE-2000-0650 Exec Code 2000-07-11 2008-09-05
2.1
None Local Low Not required None Partial None
The default installation of VirusScan 4.5 and NetShield 4.5 has insecure permissions for the registry key that identifies the AutoUpgrade directory, which allows local users to execute arbitrary commands by replacing SETUP.EXE in that directory with a Trojan Horse.
27 CVE-2000-0649 200 +Info 2000-07-13 2008-09-10
2.6
None Remote High Not required Partial None None
IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined.
28 CVE-2000-0648 DoS 2000-07-11 2008-09-10
5.0
None Remote Low Not required None None Partial
WFTPD and WFTPD Pro 2.41 allows local users to cause a denial of service by executing the RENAME TO (RNTO) command before a RENAME FROM (RNFR) command.
29 CVE-2000-0647 DoS 2000-07-21 2008-09-10
5.0
None Remote Low Not required None None Partial
WFTPD and WFTPD Pro 2.41 allows remote attackers to cause a denial of service by executing an MLST command before logging into the server.
30 CVE-2000-0646 2000-07-21 2008-09-10
5.0
None Remote Low Not required Partial None None
WFTPD and WFTPD Pro 2.41 allows remote attackers to obtain the real pathname for a file by executing a STATUS (STAT) command while the file is being transferred.
31 CVE-2000-0645 DoS 2000-07-21 2008-09-10
6.4
None Remote Low Not required None Partial Partial
WFTPD and WFTPD Pro 2.41 allows remote attackers to cause a denial of service by using the RESTART (REST) command and writing beyond the end of a file, or writing to a file that does not exist, via commands such as STORE UNIQUE (STOU), STORE (STOR), or APPEND (APPE).
32 CVE-2000-0644 DoS 2000-07-21 2008-09-10
5.0
None Remote Low Not required None None Partial
WFTPD and WFTPD Pro 2.41 allows remote attackers to cause a denial of service by executing a STAT command while the LIST command is still executing.
33 CVE-2000-0643 DoS Overflow 2000-07-12 2008-09-05
5.0
None Remote Low Not required None None Partial
Buffer overflow in WebActive HTTP Server 1.00 allows remote attackers to cause a denial of service via a long URL.
34 CVE-2000-0642 2000-07-12 2008-09-05
5.0
None Remote Low Not required Partial None None
The default configuration of WebActive HTTP Server 1.00 stores the web access log active.log in the document root, which allows remote attackers to view the logs by directly requesting the page.
35 CVE-2000-0641 Exec Code 2000-07-08 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Savant web server allows remote attackers to execute arbitrary commands via a long GET request.
36 CVE-2000-0640 2000-07-08 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Guild FTPd allows remote attackers to determine the existence of files outside the FTP root via a .. (dot dot) attack, which provides different error messages depending on whether the file exists or not.
37 CVE-2000-0638 2000-07-11 2008-09-10
10.0
None Remote Low Not required Complete Complete Complete
bb-hostsvc.sh in Big Brother 1.4h1 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack on the HOSTSVC parameter.
38 CVE-2000-0637 Exec Code 2000-07-26 2008-09-05
4.6
User Local Low Not required Partial Partial Partial
Microsoft Excel 97 and 2000 allows an attacker to execute arbitrary commands by specifying a malicious .dll using the Register.ID function, aka the "Excel REGISTER.ID Function" vulnerability.
39 CVE-2000-0636 DoS 2000-07-19 2008-09-05
5.0
None Remote Low Not required None None Partial
HP JetDirect printers versions G.08.20 and H.08.20 and earlier allow remote attackers to cause a denial of service via a malformed FTP quote command.
40 CVE-2000-0635 Exec Code 2000-07-10 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
The view_page.html sample page in the MiniVend shopping cart program allows remote attackers to execute arbitrary commands via shell metacharacters.
41 CVE-2000-0633 2000-07-18 2008-09-05
2.1
None Local Low Not required None None Partial
Vulnerability in Mandrake Linux usermode package allows local users to to reboot or halt the system.
42 CVE-2000-0632 Exec Code Overflow 2000-07-17 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in the web archive component of L-Soft Listserv 1.8d and earlier allows remote attackers to execute arbitrary commands via a long query string.
43 CVE-2000-0631 DoS 2000-07-14 2008-09-05
5.0
None Remote Low Not required None None Partial
An administrative script from IIS 3.0, later included in IIS 4.0 and 5.0, allows remote attackers to cause a denial of service by accessing the script without a particular argument, aka the "Absent Directory Browser Argument" vulnerability.
44 CVE-2000-0630 2000-07-17 2008-09-10
5.0
None Remote Low Not required Partial None None
IIS 4.0 and 5.0 allows remote attackers to obtain fragments of source code by appending a +.htr to the URL, a variant of the "File Fragment Reading via .HTR" vulnerability.
45 CVE-2000-0629 Exec Code 2000-07-12 2008-09-10
7.5
User Remote Low Not required Partial Partial Partial
The default configuration of the Sun Java web server 2.0 and earlier allows remote attackers to execute arbitrary commands by uploading Java code to the server via board.html, then directly calling the JSP compiler servlet.
46 CVE-2000-0628 2000-07-11 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
The source.asp example script in the Apache ASP module Apache::ASP 1.93 and earlier allows remote attackers to modify files.
47 CVE-2000-0627 +Priv 2000-07-18 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
BlackBoard CourseInfo 4.0 does not properly authenticate users, which allows local users to modify CourseInfo database information and gain privileges by directly calling the supporting CGI programs such as user_update_passwd.pl and user_update_admin.pl.
48 CVE-2000-0626 DoS Overflow 2000-07-18 2008-09-10
5.0
None Remote Low Not required None None Partial
Buffer overflow in Alibaba web server allows remote attackers to cause a denial of service via a long GET request.
49 CVE-2000-0625 2000-07-18 2008-09-10
4.6
User Local Low Not required Partial Partial Partial
NetZero 3.0 and earlier uses weak encryption for storing a user's login information, which allows a local user to decrypt the password.
50 CVE-2000-0624 Exec Code Overflow 2000-07-20 2008-09-05
7.5
User Remote Low Not required Partial Partial Partial
Buffer overflow in Winamp 2.64 and earlier allows remote attackers to execute arbitrary commands via a long #EXTINF: extension in the M3U playlist.
Total number of vulnerabilities : 74   Page : 1 (This Page)2
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.