Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
2000-10-20 CVE-2000-0705 Unspecified vulnerability in Luca Deri Ntop 1.2A79
ntop running in web mode allows remote attackers to read arbitrary files via a ..
network
low complexity
luca-deri
5.0
2000-10-20 CVE-2000-0700 Unspecified vulnerability in Cisco products
Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets.
network
low complexity
cisco
5.0
2000-10-20 CVE-2000-0698 Unspecified vulnerability in Minicom
Minicom 1.82.1 and earlier on some Linux systems allows local users to create arbitrary files owned by the uucp user via a symlink attack.
network
low complexity
minicom
5.0
2000-10-20 CVE-2000-0692 Unspecified vulnerability in ISS Realsecure 3.2.1/3.2.2
ISS RealSecure 3.2.1 and 3.2.2 allows remote attackers to cause a denial of service via a flood of fragmented packets with the SYN flag set.
network
low complexity
iss
5.0
2000-10-20 CVE-2000-0686 Directory Traversal vulnerability in CGI Script Center Auction Weaver
Auction Weaver CGI script 1.03 and earlier allows remote attackers to read arbitrary files via a ..
network
low complexity
cgi-script-center
5.0
2000-10-20 CVE-2000-0683 Unspecified vulnerability in BEA Weblogic Server 5.1
BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /*.shtml/ into the URL, which invokes the SSIServlet.
network
low complexity
bea
5.0
2000-10-20 CVE-2000-0682 Unspecified vulnerability in BEA Weblogic Server 5.1
BEA WebLogic 5.1.x allows remote attackers to read source code for parsed pages by inserting /ConsoleHelp/ into the URL, which invokes the FileServlet.
network
low complexity
bea
5.0
2000-10-20 CVE-2000-0678 Unspecified vulnerability in PGP 5.5.3I/6.5.1I/6.5.3I
PGP 5.5.x through 6.5.3 does not properly check if an Additional Decryption Key (ADK) is stored in the signed portion of a public certificate, which allows an attacker who can modify a victim's public certificate to decrypt any data that has been encrypted with the modified certificate.
network
low complexity
pgp
5.0
2000-10-20 CVE-2000-0676 Unspecified vulnerability in Netscape Communicator
Netscape Communicator and Navigator 4.04 through 4.74 allows remote attackers to read arbitrary files by using a Java applet to open a connection to a URL using the "file", "http", "https", and "ftp" protocols, as demonstrated by Brown Orifice.
network
low complexity
netscape
5.0
2000-10-20 CVE-2000-0360 Unspecified vulnerability in ISC INN
Buffer overflow in INN 2.2.1 and earlier allows remote attackers to cause a denial of service via a maliciously formatted article.
network
low complexity
isc
5.0