# |
CVE ID
|
CWE ID
|
# of Exploits
|
Vulnerability Type(s)
|
Publish Date
|
Update Date
|
Score
|
Gained Access Level
|
Access
|
Complexity
|
Authentication
|
Conf.
|
Integ.
|
Avail.
|
1 |
CVE-2000-1243 |
|
|
+Info |
2000-12-31 |
2018-10-19 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Privacy leak in Dansie Shopping Cart 3.04, and probably earlier versions, sends sensitive information such as user credentials to an e-mail address controlled by the product developers. |
2 |
CVE-2000-1240 |
|
|
+Info |
2000-12-31 |
2017-07-20 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Unspecified vulnerability in siteman.php3 in AnyPortal(php) before 22 APR 00 allows remote attackers to obtain sensitive information via unknown attack vectors, which reveal the absolute path. NOTE: the provenance of this information is unknown; the details are obtained from third party information. |
3 |
CVE-2000-1016 |
|
|
+Info |
2000-12-11 |
2017-10-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The default configuration of Apache (httpd.conf) on SuSE 6.4 includes an alias for the /usr/doc directory, which allows remote attackers to read package documentation and obtain system configuration information via an HTTP request for the /doc/packages URL. |
4 |
CVE-2000-0981 |
|
|
+Info |
2000-12-19 |
2019-10-07 |
7.2 |
None |
Local |
Low |
Not required |
Complete |
Complete |
Complete |
MySQL Database Engine uses a weak authentication method which leaks information that could be used by a remote attacker to recover the password. |
5 |
CVE-2000-0925 |
|
|
+Info |
2000-12-19 |
2017-10-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The default installation of SmartWin CyberOffice Shopping Cart 2 (aka CyberShop) installs the _private directory with world readable permissions, which allows remote attackers to obtain sensitive information. |
6 |
CVE-2000-0904 |
|
|
+Info |
2000-12-19 |
2008-09-05 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Voyager web server 2.01B in the demo disks for QNX 405 stores sensitive web client information in the .photon directory in the web document root, which allows remote attackers to obtain that information. |
7 |
CVE-2000-0876 |
200 |
|
+Info |
2000-11-14 |
2017-10-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
WFTPD and WFTPD Pro 2.41 RC12 allows remote attackers to obtain the full pathname of the server via a "%C" command, which generates an error message that includes the pathname. |
8 |
CVE-2000-0707 |
|
|
+Info |
2000-10-20 |
2008-09-05 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
PCCS MySQLDatabase Admin Tool Manager 1.2.4 and earlier installs the file dbconnect.inc within the web root, which allows remote attackers to obtain sensitive information such as the administrative password. |
9 |
CVE-2000-0649 |
200 |
|
+Info |
2000-07-13 |
2020-11-23 |
2.6 |
None |
Remote |
High |
Not required |
Partial |
None |
None |
IIS 4.0 allows remote attackers to obtain the internal IP address of the server via an HTTP 1.0 request for a web page which is protected by basic authentication and has no realm defined. |
10 |
CVE-2000-0588 |
200 |
|
+Info |
2000-06-26 |
2013-07-30 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
SawMill 5.0.21 CGI program allows remote attackers to read the first line of arbitrary files by listing the file in the rfcf parameter, whose contents SawMill attempts to parse as configuration commands. |
11 |
CVE-2000-0552 |
|
|
+Info |
2000-06-06 |
2017-10-10 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
ICQwebmail client for ICQ 2000A creates a world readable temporary file during login and does not delete it, which allows local users to obtain sensitive information. |
12 |
CVE-2000-0540 |
|
|
+Info |
2000-06-22 |
2017-10-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
JSP sample files in Allaire JRun 2.3.x allow remote attackers to access arbitrary files (e.g. via viewsource.jsp) or obtain configuration information. |
13 |
CVE-2000-0539 |
|
|
+Info |
2000-06-22 |
2017-10-10 |
6.4 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
None |
Servlet examples in Allaire JRun 2.3.x allow remote attackers to obtain sensitive information, e.g. listing HttpSession ID's via the SessionServlet servlet. |
14 |
CVE-2000-0427 |
|
|
+Info |
2000-05-04 |
2008-09-10 |
4.6 |
None |
Local |
Low |
Not required |
Partial |
Partial |
Partial |
The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM. |
15 |
CVE-2000-0345 |
|
|
+Info |
2000-05-03 |
2008-09-10 |
2.1 |
None |
Local |
Low |
Not required |
Partial |
None |
None |
The on-line help system options in Cisco routers allows non-privileged users without "enabled" access to obtain sensitive information via the show command. |
16 |
CVE-2000-0254 |
|
|
+Info |
2000-04-14 |
2018-05-03 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
The dansie shopping cart application cart.pl allows remote attackers to obtain the shopping cart database and configuration information via a URL that references either the env, db, or vars form variables. |
17 |
CVE-2000-0181 |
|
|
+Info |
2000-03-11 |
2008-09-10 |
5.0 |
None |
Remote |
Low |
Not required |
Partial |
None |
None |
Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote attackers to determine the real IP address of the host that is making the connection. |
18 |
CVE-2000-0132 |
200 |
|
+Info |
2000-01-31 |
2008-09-10 |
2.6 |
None |
Remote |
High |
Not required |
Partial |
None |
None |
Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function. |
19 |
CVE-2000-0057 |
|
|
+Info |
2000-01-04 |
2008-09-10 |
7.5 |
None |
Remote |
Low |
Not required |
Partial |
Partial |
Partial |
Cold Fusion CFCACHE tag places temporary cache files within the web document root, allowing remote attackers to obtain sensitive system information. |