Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
2000-10-20 CVE-2000-0789 Unspecified vulnerability in Bardon Data Systems Winu 4.X/5.0
WinU 5.x and earlier uses weak encryption to store its configuration password, which allows local users to decrypt the password and gain privileges.
local
low complexity
bardon-data-systems
4.6
2000-10-20 CVE-2000-0786 Unspecified vulnerability in GNU Userv 1.0.0
GNU userv 1.0.0 and earlier does not properly perform file descriptor swapping, which can corrupt the USERV_GROUPS and USERV_GIDS environmental variables and allow local users to bypass some access restrictions.
local
low complexity
gnu
4.6
2000-10-20 CVE-2000-0785 Unspecified vulnerability in Wircsrv IRC Server 5.0.7S
WircSrv IRC Server 5.07s allows IRC operators to read arbitrary files via the importmotd command, which sets the Message of the Day (MOTD) to the specified file.
network
low complexity
wircsrv
5.0
2000-10-20 CVE-2000-0783 Unspecified vulnerability in Watchguard Firebox II
Watchguard Firebox II allows remote attackers to cause a denial of service by sending a malformed URL to the authentication service on port 4100.
network
low complexity
watchguard
5.0
2000-10-20 CVE-2000-0780 Unspecified vulnerability in Ipswitch Imail
The web server in IPSWITCH IMail 6.04 and earlier allows remote attackers to read and delete arbitrary files via a ..
network
low complexity
ipswitch
6.4
2000-10-20 CVE-2000-0774 Path Disclosure vulnerability in Bajie Java Http Server 1.0
The sample Java servlet "test" in Bajie HTTP web server 0.30a reveals the real pathname of the web document root.
network
low complexity
bajie
5.0
2000-10-20 CVE-2000-0773 Unspecified vulnerability in Bajie Java Http Server 1.0
Bajie HTTP web server 0.30a allows remote attackers to read arbitrary files via a URL that contains a "....", a variant of the dot dot directory traversal attack.
network
low complexity
bajie
5.0
2000-10-20 CVE-2000-0770 Unspecified vulnerability in Microsoft products
IIS 4.0 and 5.0 does not properly restrict access to certain types of files when their parent folders have less restrictive permissions, which could allow remote attackers to bypass access restrictions to some files, aka the "File Permission Canonicalization" vulnerability.
network
low complexity
microsoft
6.4
2000-10-20 CVE-2000-0765 Unspecified vulnerability in Microsoft Excel, Powerpoint and Word
Buffer overflow in the HTML interpreter in Microsoft Office 2000 allows an attacker to execute arbitrary commands via a long embedded object tag, aka the "Microsoft Office HTML Object Tag" vulnerability.
network
high complexity
microsoft
5.1
2000-10-20 CVE-2000-0764 Unspecified vulnerability in Intel Express 8100
Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed IP packet.
network
low complexity
intel
5.0