Логотип exploitDog
source:"nvd"
Консоль
Логотип exploitDog

exploitDog

source:"nvd"

Количество 330 476

Количество 330 476

nvd логотип

CVE-2000-1128

около 25 лет назад

The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2000-1127

около 25 лет назад

registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable.

CVSS2: 3.6
EPSS: Низкий
nvd логотип

CVE-2000-1126

около 25 лет назад

Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service.

CVSS2: 10
EPSS: Низкий
nvd логотип

CVE-2000-1125

около 25 лет назад

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1124

около 25 лет назад

Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1123

около 25 лет назад

Buffer overflow in pioout command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1122

около 25 лет назад

Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1121

около 25 лет назад

Buffer overflow in enq command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long -M argument.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1120

около 25 лет назад

Buffer overflow in digest command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1119

около 25 лет назад

Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2000-1118

около 25 лет назад

24Link 1.06 web server allows remote attackers to bypass access restrictions by prepending strings such as "/+/" or "/." to the HTTP GET request.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2000-1117

около 25 лет назад

The Extended Control List (ECL) feature of the Java Virtual Machine (JVM) in Lotus Notes Client R5 allows malicious web site operators to determine the existence of files on the client by measuring delays in the execution of the getSystemResource method.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2000-1116

около 25 лет назад

Buffer overflow in TransSoft Broker FTP Server before 4.3.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long command.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2000-1115

около 25 лет назад

Buffer overflow in remote web administration component (webprox.dll) of 602Pro LAN SUITE before 2000.0.1.33 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long GET request.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2000-1114

около 25 лет назад

Unify ServletExec AS v3.0C allows remote attackers to read source code for JSP pages via an HTTP request that ends with characters such as ".", or "+", or "%20".

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2000-1113

около 25 лет назад

Buffer overflow in Microsoft Windows Media Player allows remote attackers to execute arbitrary commands via a malformed Active Stream Redirector (.ASX) file, aka the ".ASX Buffer Overrun" vulnerability.

CVSS2: 7.5
EPSS: Средний
nvd логотип

CVE-2000-1112

около 25 лет назад

Microsoft Windows Media Player 7 executes scripts in custom skin (.WMS) files, which could allow remote attackers to gain privileges via a skin that contains a malicious script, aka the ".WMS Script Execution" vulnerability.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2000-1111

около 25 лет назад

Telnet Service for Windows 2000 Professional does not properly terminate incomplete connection attempts, which allows remote attackers to cause a denial of service by connecting to the server and not providing any input.

CVSS2: 5
EPSS: Средний
nvd логотип

CVE-2000-1110

около 25 лет назад

document.d2w CGI program in the IBM Net.Data db2www package allows remote attackers to determine the physical path of the web server by sending a nonexistent command to the program.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2000-1109

около 25 лет назад

Midnight Commander (mc) 4.5.51 and earlier does not properly process malformed directory names when a user opens a directory, which allows other local users to gain privileges by creating directories that contain special characters followed by the commands to be executed.

CVSS2: 4.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2000-1128

The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.

CVSS2: 4.6
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1127

registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable.

CVSS2: 3.6
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1126

Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service.

CVSS2: 10
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1125

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1124

Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1123

Buffer overflow in pioout command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1122

Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1121

Buffer overflow in enq command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long -M argument.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1120

Buffer overflow in digest command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1119

Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument.

CVSS2: 4.6
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1118

24Link 1.06 web server allows remote attackers to bypass access restrictions by prepending strings such as "/+/" or "/." to the HTTP GET request.

CVSS2: 7.5
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1117

The Extended Control List (ECL) feature of the Java Virtual Machine (JVM) in Lotus Notes Client R5 allows malicious web site operators to determine the existence of files on the client by measuring delays in the execution of the getSystemResource method.

CVSS2: 5
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1116

Buffer overflow in TransSoft Broker FTP Server before 4.3.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long command.

CVSS2: 7.5
6%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1115

Buffer overflow in remote web administration component (webprox.dll) of 602Pro LAN SUITE before 2000.0.1.33 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long GET request.

CVSS2: 7.5
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1114

Unify ServletExec AS v3.0C allows remote attackers to read source code for JSP pages via an HTTP request that ends with characters such as ".", or "+", or "%20".

CVSS2: 5
6%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1113

Buffer overflow in Microsoft Windows Media Player allows remote attackers to execute arbitrary commands via a malformed Active Stream Redirector (.ASX) file, aka the ".ASX Buffer Overrun" vulnerability.

CVSS2: 7.5
14%
Средний
около 25 лет назад
nvd логотип
CVE-2000-1112

Microsoft Windows Media Player 7 executes scripts in custom skin (.WMS) files, which could allow remote attackers to gain privileges via a skin that contains a malicious script, aka the ".WMS Script Execution" vulnerability.

CVSS2: 4.6
2%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1111

Telnet Service for Windows 2000 Professional does not properly terminate incomplete connection attempts, which allows remote attackers to cause a denial of service by connecting to the server and not providing any input.

CVSS2: 5
19%
Средний
около 25 лет назад
nvd логотип
CVE-2000-1110

document.d2w CGI program in the IBM Net.Data db2www package allows remote attackers to determine the physical path of the web server by sending a nonexistent command to the program.

CVSS2: 5
6%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1109

Midnight Commander (mc) 4.5.51 and earlier does not properly process malformed directory names when a user opens a directory, which allows other local users to gain privileges by creating directories that contain special characters followed by the commands to be executed.

CVSS2: 4.6
0%
Низкий
около 25 лет назад

Уязвимостей на страницу