Weekly Vulnerabilities Reports > January 24 to 30, 2000
Overview
11 new vulnerabilities reported during this period, including 0 critical vulnerabilities and 7 high severity vulnerabilities. This weekly summary report vulnerabilities in 12 products from 9 vendors including Microsoft, IBM, HP, Qualcomm, and Checkpoint. Vulnerabilities are notably categorized as and "Classic Buffer Overflow".
- 7 reported vulnerabilities are remotely exploitables.
- 11 reported vulnerabilities are exploitable by an anonymous user.
- Microsoft has the most reported vulnerabilities, with 3 reported vulnerabilities.
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
VULNERABILITIES
EXPLOITABLE
EXPLOITABLE
AVAILABLE
ANONYMOUSLY
WEB APPLICATION
Vulnerability Details
The following table list reported vulnerabilities for the period covered by this report:
0 Critical Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|
7 High Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2000-01-29 | CVE-2000-0116 | Checkpoint | Unspecified vulnerability in Checkpoint Firewall-1 3.0 Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the "Strip Script Tags" restriction by including an extra < in front of the SCRIPT tag. | 7.5 |
2000-01-29 | CVE-2000-0111 | AVT | Unspecified vulnerability in AVT Rightfax 5.2 The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions. | 7.5 |
2000-01-27 | CVE-2000-0113 | Sybergen | Unspecified vulnerability in Sybergen Sygate 2.0/3.11 The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics. | 7.5 |
2000-01-30 | CVE-2000-0117 | SUN | Unspecified vulnerability in SUN Cobalt Raq, Cobalt RAQ 2 and Cobalt RAQ 3I The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root). | 7.2 |
2000-01-27 | CVE-2000-1216 | IBM | Classic Buffer Overflow vulnerability in IBM AIX 4.3.0 Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine. | 7.2 |
2000-01-27 | CVE-2000-0130 | SCO | Unspecified vulnerability in SCO Unixware 7.0/7.0.1/7.1 Buffer overflow in SCO scohelp program allows remote attackers to execute commands. | 7.2 |
2000-01-26 | CVE-2000-0096 | Qualcomm | Buffer Overflow vulnerability in Qualcomm qpopper 'LIST' Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command. | 7.2 |
4 Medium Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|---|---|---|---|
2000-01-26 | CVE-2000-0126 | Microsoft | Unspecified vulnerability in Microsoft Internet Information Server 3.0/4.0 Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. | 5.0 |
2000-01-26 | CVE-2000-0098 | Microsoft | Unspecified vulnerability in Microsoft Index Server 2.0 Microsoft Index Server allows remote attackers to determine the real path for a web directory via a request to an Internet Data Query file that does not exist. | 5.0 |
2000-01-26 | CVE-2000-0097 | Microsoft | Unspecified vulnerability in Microsoft Index Server 2.0 The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the "Malformed Hit-Highlighting Argument" vulnerability. | 5.0 |
2000-01-24 | CVE-2000-0095 | HP | Unspecified vulnerability in HP Hp-Ux 10.30/11.00 The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier. | 5.0 |
0 Low Vulnerabilities
DATE | CVE | VENDOR | VULNERABILITY | CVSS |
---|