Vulnerabilities (CVE)

Total 304758 CVE
CVE Vendors Products Updated CVSS v2 CVSS v3
CVE-2000-0440 2 Freebsd, Netbsd 2 Freebsd, Netbsd 2008-09-10 5.0 MEDIUM N/A
NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option.
CVE-2000-0350 1 Networkice 1 Icecap Manager 2008-09-10 5.0 MEDIUM N/A
A debugging feature in NetworkICE ICEcap 2.0.23 and earlier is enabled, which allows a remote attacker to bypass the weak authentication and post unencrypted events.
CVE-2000-0453 1 Xfree86 Project 1 X11r6 2008-09-10 5.0 MEDIUM N/A
XFree86 3.3.x and 4.0 allows a user to cause a denial of service via a negative counter value in a malformed TCP packet that is sent to port 6000.
CVE-2000-0434 1 Matthew Redman 1 Allmanage 2008-09-10 7.5 HIGH N/A
The administrative password for the Allmanage web site administration software is stored in plaintext in a file which could be accessed by remote attackers.
CVE-2000-0387 1 Alexander Siegel 1 Golddig 2008-09-10 2.1 LOW N/A
The makelev program in the golddig game from the FreeBSD ports collection allows local users to overwrite arbitrary files.
CVE-2000-0452 1 Lotus 2 Domino Enterprise Server, Domino Mail Server 2008-09-10 5.0 MEDIUM N/A
Buffer overflow in the ESMTP service of Lotus Domino Server 5.0.1 allows remote attackers to cause a denial of service via a long MAIL FROM command.
CVE-2000-0356 1 Redhat 1 Linux 2008-09-10 4.6 MEDIUM N/A
Pluggable Authentication Modules (PAM) in Red Hat Linux 6.1 does not properly lock access to disabled NIS accounts.
CVE-2000-0444 1 Hp 1 Jetadmin 2008-09-10 5.0 MEDIUM N/A
HP Web JetAdmin 6.0 allows remote attackers to cause a denial of service via a malformed URL to port 8000.
CVE-2000-0385 1 Filemaker 1 Filemaker 2008-09-10 5.0 MEDIUM N/A
FileMaker Pro 5 Web Companion allows remote attackers to bypass Field-Level database security restrictions via the XML publishing or email capabilities.
CVE-2000-0357 1 Redhat 1 Linux 2008-09-10 7.5 HIGH N/A
ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys.
CVE-2000-0353 1 University Of Washington 1 Pine 2008-09-10 10.0 HIGH N/A
Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine.
CVE-2000-0296 1 Michael A. Gumienny 1 Fcheck 2008-09-10 7.2 HIGH N/A
fcheck allows local users to gain privileges by embedding shell metacharacters into file names that are processed by fcheck.
CVE-2000-0420 1 Microsoft 1 Windows 2000 2008-09-10 7.2 HIGH N/A
The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data.
CVE-2000-0451 1 Intel 1 Express 8100 2008-09-10 5.0 MEDIUM N/A
The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets.
CVE-2000-0461 2 Freebsd, Netbsd 2 Freebsd, Netbsd 2008-09-10 2.1 LOW N/A
The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call.
CVE-2000-0428 1 Trend Micro 1 Interscan Viruswall 2008-09-10 10.0 HIGH N/A
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment.
CVE-2000-0363 1 Suse 1 Suse Linux 2008-09-10 6.2 MEDIUM N/A
Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory.
CVE-2000-0284 1 University Of Washington 1 Imap 2008-09-10 7.5 HIGH N/A
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands.
CVE-2000-0375 1 Freebsd 1 Freebsd 2008-09-10 2.1 LOW N/A
The kernel in FreeBSD 3.2 follows symbolic links when it creates core dump files, which allows local attackers to modify arbitrary files.
CVE-2000-0445 1 Pgp 1 Pgp 2008-09-10 2.1 LOW N/A
The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys.