Vulnerabilities (CVE)

Filtered by NVD-CWE-Other
Total 29527 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2000-0494 1 Symantec Veritas 1 Volume Manager 2008-09-10 7.2 HIGH N/A
Veritas Volume Manager creates a world writable .server_pids file, which allows local users to add arbitrary commands into the file, which is then executed by the vmsa_server script.
CVE-2000-0446 1 Marty Bochane 1 Mdbms 2008-09-10 7.5 HIGH N/A
Buffer overflow in MDBMS database server allows remote attackers to execute arbitrary commands via a long string.
CVE-2000-0184 2 Mandrakesoft, Redhat 2 Mandrake Linux, Linux 2008-09-10 2.1 LOW N/A
Linux printtool sets the permissions of printer configuration files to be world-readable, which allows local attackers to obtain printer share passwords.
CVE-2000-0199 1 Microsoft 1 Sql Server 2008-09-10 7.2 HIGH N/A
When a new SQL Server is registered in Enterprise Manager for Microsoft SQL Server 7.0 and the "Always prompt for login name and password" option is not set, then the Enterprise Manager uses weak encryption to store the login ID and password.
CVE-2000-0186 4 Freebsd, Mandrakesoft, Redhat and 1 more 4 Freebsd, Mandrake Linux, Linux and 1 more 2008-09-10 7.2 HIGH N/A
Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument.
CVE-2000-0263 1 Redhat 1 Linux 2008-09-10 2.1 LOW N/A
The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request.
CVE-2000-0215 1 Sco 1 Unixware 2008-09-10 7.2 HIGH N/A
Vulnerability in SCO cu program in UnixWare 7.x allows local users to gain privileges.
CVE-2000-0282 1 Talentsoft 1 Web\+ 2008-09-10 5.0 MEDIUM N/A
TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webplus CGI program.
CVE-2000-0249 1 Ibm 1 Aix 2008-09-10 7.2 HIGH N/A
The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program.
CVE-2000-0176 1 Cat Soft 1 Serv-u 2008-09-10 5.0 MEDIUM N/A
The default configuration of Serv-U 2.5d and earlier allows remote attackers to determine the real pathname of the server by requesting a URL for a directory or file that does not exist.
CVE-2000-0208 1 Htdig 1 Htdig 2008-09-10 5.0 MEDIUM N/A
The htdig (ht://Dig) CGI program htsearch allows remote attackers to read arbitrary files by enclosing the file name with backticks (`) in parameters to htsearch.
CVE-2000-0171 1 At Computing 1 Atsar Linux 2008-09-10 7.2 HIGH N/A
atsadc in the atsar package for Linux does not properly check the permissions of an output file, which allows local users to gain root privileges.
CVE-2000-0223 1 Sam Hawker 1 Wmcdplay 2008-09-10 7.2 HIGH N/A
Buffer overflow in the wmcdplay CD player program for the WindowMaker desktop allows local users to gain root privileges via a long parameter.
CVE-2000-0178 1 Foundrynet 1 Serveriron 2008-09-10 7.5 HIGH N/A
ServerIron switches by Foundry Networks have predictable TCP/IP sequence numbers, which allows remote attackers to spoof or hijack sessions.
CVE-2000-0267 1 Cisco 1 Catos 2008-09-10 4.6 MEDIUM N/A
Cisco Catalyst 5.4.x allows a user to gain access to the "enable" mode without a password.
CVE-2000-0167 1 Microsoft 1 Internet Information Server 2008-09-10 2.1 LOW N/A
IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long name and a .txt.eml extension in the pickup directory.
CVE-2000-0237 1 Netscape 1 Enterprise Server 2008-09-10 6.4 MEDIUM N/A
Netscape Enterprise Server with Web Publishing enabled allows remote attackers to list arbitrary directories via a GET request for the /publisher directory, which provides a Java applet that allows the attacker to browse the directories.
CVE-2000-0170 2 Redhat, Turbolinux 2 Linux, Turbolinux 2008-09-10 7.2 HIGH N/A
Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable.
CVE-2000-0197 1 Microsoft 1 Windows Nt 2008-09-10 4.6 MEDIUM N/A
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
CVE-2000-0217 2 Openbsd, Ssh 3 Openssh, Ssh, Ssh2 2008-09-10 5.1 MEDIUM N/A
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.