Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-0300

6 documents4 sources
Severity
10.0CRITICAL
EPSS
1.4%
top 19.64%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedApr 6
Latest updateApr 30

Description

The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-fvrm-4gj8-jr73: The default encryption method of PcAnywhere 92022-04-30
CVEList
CVE-2000-0300: The default encryption method of PcAnywhere 92000-04-26

💥Exploits & PoCs

3
Exploit-DB
Cisco VPN Client - Integer Overflow Denial of Service2009-11-21
Exploit-DB
GNUJSP 1.0 - File Disclosure2002-02-19
Exploit-DB
Symantec pcAnywhere 9.0 - Weak Encryption2000-04-06
CVE-2000-0300 (CRITICAL CVSS 10) | The default encryption method of Pc | cvebase.io