Логотип exploitDog
source:"nvd"
Консоль
Логотип exploitDog

exploitDog

source:"nvd"

Количество 331 703

Количество 331 703

nvd логотип

CVE-2000-1135

около 25 лет назад

fshd (fsh daemon) in Debian GNU/Linux allows local users to overwrite files of other users via a symlink attack.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2000-1134

около 25 лет назад

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1133

около 25 лет назад

Authentix Authentix100 allows remote attackers to bypass authentication by inserting a . (dot) into the URL for a protected directory.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2000-1132

около 25 лет назад

DCForum cgforum.cgi CGI script allows remote attackers to read arbitrary files, and delete the program itself, via a malformed "forum" variable.

CVSS2: 6.4
EPSS: Низкий
nvd логотип

CVE-2000-1131

около 25 лет назад

Bill Kendrick web site guestbook (GBook) allows remote attackers to execute arbitrary commands via shell metacharacters in the _MAILTO form variable.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2000-1130

около 25 лет назад

McAfee WebShield SMTP 4.5 allows remote attackers to bypass email content filtering rules by including Extended ASCII characters in name of the attachment.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2000-1129

около 25 лет назад

McAfee WebShield SMTP 4.5 allows remote attackers to cause a denial of service via a malformed recipient field.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2000-1128

около 25 лет назад

The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2000-1127

около 25 лет назад

registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable.

CVSS2: 3.6
EPSS: Низкий
nvd логотип

CVE-2000-1126

около 25 лет назад

Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service.

CVSS2: 10
EPSS: Низкий
nvd логотип

CVE-2000-1125

около 25 лет назад

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1124

около 25 лет назад

Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1123

около 25 лет назад

Buffer overflow in pioout command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1122

около 25 лет назад

Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1121

около 25 лет назад

Buffer overflow in enq command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long -M argument.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1120

около 25 лет назад

Buffer overflow in digest command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-2000-1119

около 25 лет назад

Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-2000-1118

около 25 лет назад

24Link 1.06 web server allows remote attackers to bypass access restrictions by prepending strings such as "/+/" or "/." to the HTTP GET request.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-2000-1117

около 25 лет назад

The Extended Control List (ECL) feature of the Java Virtual Machine (JVM) in Lotus Notes Client R5 allows malicious web site operators to determine the existence of files on the client by measuring delays in the execution of the getSystemResource method.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-2000-1116

около 25 лет назад

Buffer overflow in TransSoft Broker FTP Server before 4.3.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long command.

CVSS2: 7.5
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2000-1135

fshd (fsh daemon) in Debian GNU/Linux allows local users to overwrite files of other users via a symlink attack.

CVSS2: 4.6
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1134

Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1133

Authentix Authentix100 allows remote attackers to bypass authentication by inserting a . (dot) into the URL for a protected directory.

CVSS2: 5
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1132

DCForum cgforum.cgi CGI script allows remote attackers to read arbitrary files, and delete the program itself, via a malformed "forum" variable.

CVSS2: 6.4
8%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1131

Bill Kendrick web site guestbook (GBook) allows remote attackers to execute arbitrary commands via shell metacharacters in the _MAILTO form variable.

CVSS2: 7.5
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1130

McAfee WebShield SMTP 4.5 allows remote attackers to bypass email content filtering rules by including Extended ASCII characters in name of the attachment.

CVSS2: 7.5
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1129

McAfee WebShield SMTP 4.5 allows remote attackers to cause a denial of service via a malformed recipient field.

CVSS2: 5
4%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1128

The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory.

CVSS2: 4.6
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1127

registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable.

CVSS2: 3.6
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1126

Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service.

CVSS2: 10
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1125

restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1124

Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1123

Buffer overflow in pioout command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1122

Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1121

Buffer overflow in enq command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long -M argument.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1120

Buffer overflow in digest command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands.

CVSS2: 7.2
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1119

Buffer overflow in setsenv command in IBM AIX 4.3.x and earlier allows local users to execute arbitrary commands via a long "x=" argument.

CVSS2: 4.6
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1118

24Link 1.06 web server allows remote attackers to bypass access restrictions by prepending strings such as "/+/" or "/." to the HTTP GET request.

CVSS2: 7.5
0%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1117

The Extended Control List (ECL) feature of the Java Virtual Machine (JVM) in Lotus Notes Client R5 allows malicious web site operators to determine the existence of files on the client by measuring delays in the execution of the getSystemResource method.

CVSS2: 5
1%
Низкий
около 25 лет назад
nvd логотип
CVE-2000-1116

Buffer overflow in TransSoft Broker FTP Server before 4.3.0.1 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long command.

CVSS2: 7.5
6%
Низкий
около 25 лет назад

Уязвимостей на страницу