Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
2000-05-04 CVE-2000-0428 Unspecified vulnerability in Trend Micro Interscan Viruswall
Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment.
network
low complexity
trend-micro
critical
10.0
2000-05-04 CVE-2000-0427 Unspecified vulnerability in Aladdin Knowledge Systems Etoken 3.3.3
The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM.
local
low complexity
aladdin-knowledge-systems
4.6
2000-05-04 CVE-2000-0422 Buffer Overflow vulnerability in Netwin Dmail 2.5D
Buffer overflow in Netwin DMailWeb CGI program allows remote attackers to execute arbitrary commands via a long utoken parameter.
network
low complexity
netwin
7.5
2000-05-04 CVE-2000-0414 Unspecified vulnerability in HP Hp-Ux and Vvos
Vulnerability in shutdown command for HP-UX 11.X and 10.X allows allows local users to gain privileges via malformed input variables.
local
low complexity
hp
4.6
2000-05-03 CVE-2000-0430 Unspecified vulnerability in Mcmurtrey Whitaker and Associates Cart32 3.0
Cart32 allows remote attackers to access sensitive debugging information by appending /expdate to the URL request.
network
low complexity
mcmurtrey-whitaker-and-associates
5.0
2000-05-03 CVE-2000-0425 Unspecified vulnerability in Lsoft Listserv 1.8
Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands.
network
low complexity
lsoft
critical
10.0
2000-05-03 CVE-2000-0378 Unspecified vulnerability in Redhat Linux 6.0/6.1/6.2
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
local
low complexity
redhat
7.2
2000-05-03 CVE-2000-0335 The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results.
network
low complexity
gnu isc
7.5
2000-05-03 CVE-2000-0303 Unspecified vulnerability in ID Software Quake 3 Arena 1.16N
Quake3 Arena allows malicious server operators to read or modify files on a client via a dot dot (..) attack.
network
low complexity
id-software
6.4
2000-05-02 CVE-2000-0433 Unspecified vulnerability in Suse Linux
The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles.
local
low complexity
suse
4.6