Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
2000-02-24 CVE-2000-0217 The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
network
high complexity
openbsd ssh
5.1
2000-02-24 CVE-2000-0212 Unspecified vulnerability in Pragma Systems Interaccess Telnetd Server 4.0
InterAccess TelnetD Server 4.0 allows remote attackers to conduct a denial of service via malformed terminal client configuration information.
network
low complexity
pragma-systems
5.0
2000-02-23 CVE-2000-0211 Unspecified vulnerability in Microsoft Windows Media Services 4.0/4.1
The Windows Media server allows remote attackers to cause a denial of service via a series of client handshake packets that are sent in an improper sequence, aka the "Misordered Windows Media Services Handshake" vulnerability.
network
low complexity
microsoft
5.0
2000-02-23 CVE-2000-0182 Unspecified vulnerability in Iplanet web Server 4.1Enterprise
iPlanet Web Server 4.1 allows remote attackers to cause a denial of service via a large number of GET commands, which consumes memory and causes a kernel panic.
network
low complexity
iplanet
5.0
2000-02-21 CVE-2000-0163 Unspecified vulnerability in Freebsd
asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file.
local
low complexity
freebsd
4.6
2000-02-18 CVE-2000-0162 Unspecified vulnerability in Microsoft IE, Internet Explorer and Visual Studio
The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the "VM File Reading" vulnerability.
network
high complexity
microsoft
5.1
2000-02-16 CVE-2000-0156 Unspecified vulnerability in Microsoft Internet Explorer
Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the "Image Source Redirect" vulnerability.
network
high complexity
microsoft
5.1
2000-02-14 CVE-2000-0197 Unspecified vulnerability in Microsoft Windows NT 4.0
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
local
low complexity
microsoft
4.6
2000-02-11 CVE-2000-0143 The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP.
local
low complexity
ssh openbsd
4.6
2000-02-11 CVE-2000-0142 Unspecified vulnerability in Netopia Timbuktu PRO 2.0/5.2.1
The authentication protocol in Timbuktu Pro 2.0b650 allows remote attackers to cause a denial of service via connections to port 407 and 1417.
network
low complexity
netopia
5.0