GNU Groff uses the current working directory to find a device description file, which allows a local user to gain additional privileges by including a malicious postpro directive in the description file, which is executed when another user runs groff.
Max CVSS
10.0
EPSS Score
0.56%
Published
2000-12-19
Updated
2021-05-10
The default installation for the Oracle listener program 7.3.4, 8.0.6, and 8.1.6 allows an attacker to cause logging information to be appended to arbitrary files and execute commands via the SET TRC_FILE or SET LOG_FILE commands.
Max CVSS
10.0
EPSS Score
0.69%
Published
2000-12-19
Updated
2017-10-10

CVE-2000-0917

Public exploit
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
95.71%
Published
2000-12-19
Updated
2017-10-10
Kootenay Web KW Whois 1.0 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the "whois" parameter.
Max CVSS
10.0
EPSS Score
18.80%
Published
2000-12-19
Updated
2017-10-10

CVE-2000-0945

Public exploit
The web configuration interface for Catalyst 3500 XL switches allows remote attackers to execute arbitrary commands without authentication when the enable password is not set, via a URL containing the /exec/ directory.
Max CVSS
10.0
EPSS Score
96.50%
Published
2000-12-19
Updated
2017-10-10
Format string vulnerability in cfd daemon in GNU CFEngine before 1.6.0a11 allows attackers to execute arbitrary commands via format characters in the CAUTH command.
Max CVSS
10.0
EPSS Score
0.30%
Published
2000-12-19
Updated
2017-10-10
global.cgi CGI program in Global 3.55 and earlier on NetBSD allows remote attackers to execute arbitrary commands via shell metacharacters.
Max CVSS
10.0
EPSS Score
0.49%
Published
2000-12-19
Updated
2018-05-03
Shambala Server 4.5 stores passwords in plaintext, which could allow local users to obtain the passwords and compromise the server.
Max CVSS
10.0
EPSS Score
0.50%
Published
2000-12-19
Updated
2017-12-19
Buffer overflow in IMAP server in Netscape Messaging Server 4.15 Patch 2 allows local users to execute arbitrary commands via a long LIST command.
Max CVSS
10.0
EPSS Score
0.54%
Published
2000-12-19
Updated
2017-10-10
Buffer overflow in the web administration service for the HiNet LP5100 IP-phone allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long GET request.
Max CVSS
10.0
EPSS Score
0.35%
Published
2000-12-19
Updated
2017-10-10
PHP 3 and 4 do not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands by triggering error messages that are improperly written to the error logs.
Max CVSS
10.0
EPSS Score
34.05%
Published
2000-12-19
Updated
2018-05-03
Buffer overflow in Half Life dedicated server before build 3104 allows remote attackers to execute arbitrary commands via a long rcon command.
Max CVSS
10.0
EPSS Score
0.73%
Published
2000-12-19
Updated
2017-10-10
Format string vulnerability in Half Life dedicated server build 3104 and earlier allows remote attackers to execute arbitrary commands by injecting format strings into the changelevel command, via the system console or rcon.
Max CVSS
10.0
EPSS Score
0.75%
Published
2000-12-19
Updated
2017-10-10
Avirt Mail 4.0 and 4.2 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long "RCPT TO" or "MAIL FROM" command.
Max CVSS
10.0
EPSS Score
30.16%
Published
2000-12-19
Updated
2017-12-19
Buffer overflow in curl earlier than 6.0-1.1, and curl-ssl earlier than 6.0-1.2, allows remote attackers to execute arbitrary commands by forcing a long error message to be generated.
Max CVSS
10.0
EPSS Score
2.86%
Published
2000-12-19
Updated
2018-05-03
Buffer overflow in All-Mail 1.1 allows remote attackers to execute arbitrary commands via a long "MAIL FROM" or "RCPT TO" command.
Max CVSS
10.0
EPSS Score
0.52%
Published
2000-12-19
Updated
2008-09-05
Format string vulnerabilities in OpenBSD ssh program (and possibly other BSD-based operating systems) allow attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
0.55%
Published
2000-12-11
Updated
2008-09-05
Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters.
Max CVSS
10.0
EPSS Score
0.54%
Published
2000-12-11
Updated
2017-10-10
eWave ServletExec 3.0C and earlier does not restrict access to the UploadServlet Java/JSP servlet, which allows remote attackers to upload files and execute arbitrary commands.
Max CVSS
10.0
EPSS Score
0.41%
Published
2000-12-11
Updated
2017-10-10
Multiple buffer overflows in LBNL tcpdump allow remote attackers to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
1.55%
Published
2000-12-11
Updated
2018-05-03
Buffer overflow in host command allows a remote attacker to execute arbitrary commands via a long response to an AXFR query.
Max CVSS
10.0
EPSS Score
0.94%
Published
2000-12-11
Updated
2017-07-11
Buffer overflow in the System Monitor ActiveX control in Windows 2000 allows remote attackers to execute arbitrary commands via a long LogFileName parameter in HTML source code, aka the "ActiveX Parameter Validation" vulnerability.
Max CVSS
10.0
EPSS Score
0.11%
Published
2000-12-11
Updated
2018-10-12
Buffer overflows in TYPSoft FTP Server 0.78 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a long USER, PASS, or CWD command.
Max CVSS
10.0
EPSS Score
35.97%
Published
2000-12-11
Updated
2016-10-18
Format string vulnerability in logging function of ypbind 3.3, while running in debug mode, leaks file descriptors and allows an attacker to cause a denial of service.
Max CVSS
10.0
EPSS Score
1.03%
Published
2000-12-11
Updated
2017-10-10
Buffer overflow in ypbind 3.3 possibly allows an attacker to gain root privileges.
Max CVSS
10.0
EPSS Score
0.47%
Published
2000-12-11
Updated
2017-10-10
212 vulnerabilities found
1 2 3 4 5 6 7 8 9
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!