CVE List
Id | CVE No. | Status | Description | Phase | Votes | Comments | Actions |
---|---|---|---|---|---|---|---|
1874 | CVE-2000-0296 | Entry | fcheck allows local users to gain privileges by embedding shell metacharacters into file names that are processed by fcheck. | View | |||
2130 | CVE-2000-0553 | Entry | Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping "return-rst" and "keep state" rules, allows remote attackers to bypass access restrictions. | View | |||
2386 | CVE-2000-0810 | Entry | Auction Weaver 1.0 through 1.04 does not properly validate the names of form fields, which allows remote attackers to delete arbitrary files and directories via a .. (dot dot) attack. | View | |||
2642 | CVE-2000-1074 | Entry | csstart program in iCal 2.1 Patch 2 uses relative pathnames to install the libsocket and libnsl libraries, which could allow the icsuser account to gain root privileges by creating a Trojan Horse library in the current or parent directory. | View | |||
2898 | CVE-2001-0077 | Entry | The clustmon service in Sun Cluster 2.x does not require authentication, which allows remote attackers to obtain sensitive information such as system logs and cluster configurations. | View |
Page 198 of 20943, showing 5 records out of 104715 total, starting on record 986, ending on 990