Vulnerabilities (CVE)

Filtered by NVD-CWE-Other
Total 29527 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2000-0353 1 University Of Washington 1 Pine 2008-09-10 10.0 HIGH N/A
Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine.
CVE-2000-0296 1 Michael A. Gumienny 1 Fcheck 2008-09-10 7.2 HIGH N/A
fcheck allows local users to gain privileges by embedding shell metacharacters into file names that are processed by fcheck.
CVE-2000-0420 1 Microsoft 1 Windows 2000 2008-09-10 7.2 HIGH N/A
The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.
CVE-2000-0451 1 Intel 1 Express 8100 2008-09-10 5.0 MEDIUM N/A
The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets.
CVE-2000-0461 2 Freebsd, Netbsd 2 Freebsd, Netbsd 2008-09-10 2.1 LOW N/A
The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.
CVE-2000-0428 1 Trend Micro 1 Interscan Viruswall 2008-09-10 10.0 HIGH N/A
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment.
CVE-2000-0363 1 Suse 1 Suse Linux 2008-09-10 6.2 MEDIUM N/A
Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory.
CVE-2000-0284 1 University Of Washington 1 Imap 2008-09-10 7.5 HIGH N/A
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
CVE-2000-0375 1 Freebsd 1 Freebsd 2008-09-10 2.1 LOW N/A
The kernel in FreeBSD 3.2 follows symbolic links when it creates core dump files, which allows local attackers to modify arbitrary files.
CVE-2000-0445 1 Pgp 1 Pgp 2008-09-10 2.1 LOW N/A
The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys.
CVE-2000-0335 2 Gnu, Isc 2 Glibc, Bind 2008-09-10 7.5 HIGH N/A
The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.
CVE-2000-0369 1 Caldera 1 Openlinux 2008-09-10 5.0 MEDIUM N/A
The IDENT server in Caldera Linux 2.3 creates multiple threads for each IDENT request, which allows remote attackers to cause a denial of service.
CVE-2000-0367 1 Michael Jennings 1 Eterm 2008-09-10 7.2 HIGH N/A
Vulnerability in eterm 0.8.8 in Debian GNU/Linux allows an attacker to gain root privileges.
CVE-2000-0418 1 Cayman 2 3220-h Dsl Router, Gatorsurf 2008-09-10 5.0 MEDIUM N/A
The Cayman 3220-H DSL router allows remote attackers to cause a denial of service via oversized ICMP echo (ping) requests.
CVE-2000-0362 1 Suse 1 Suse Linux 2008-09-10 7.2 HIGH N/A
Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges.
CVE-2000-0299 1 Apple 1 Webobjects 2008-09-10 5.0 MEDIUM N/A
Buffer overflow in WebObjects.exe in the WebObjects Developer 4.5 package allows remote attackers to cause a denial of service via an HTTP request with long headers such as Accept.
CVE-2000-0355 3 Bent Bagger, Redhat, Suse 3 Pbpg, Linux, Suse Linux 2008-09-10 7.5 HIGH N/A
pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files.
CVE-2000-0454 1 Mandrakesoft 1 Mandrake Linux 2008-09-10 7.2 HIGH N/A
Buffer overflow in Linux cdrecord allows local users to gain privileges via the dev parameter.
CVE-2000-0287 1 Cnc 1 Technology Bizdb 2008-09-10 10.0 HIGH N/A
The BizDB CGI script bizdb-search.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the dbname parameter.
CVE-2000-0361 1 Suse 1 Suse Linux 2008-09-10 2.1 LOW N/A
The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information.