Buffer overflows in the (1) outpack or (2) buf variables of ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, may allow local users to gain privileges.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-10-18
Updated
2016-10-18
ping in iputils before 20001010, as distributed on Red Hat Linux 6.2 through 7J and other operating systems, does not drop privileges after acquiring a raw socket, which increases ping's exposure to bugs that otherwise would occur at lower privileges.
Max CVSS
7.5
EPSS Score
0.88%
Published
2000-10-18
Updated
2016-10-18
Vulnerability in the mod_vhost_alias virtual hosting module for Apache 1.3.9, 1.3.11 and 1.3.12 allows remote attackers to obtain the source code for CGI programs if the cgi-bin directory is under the document root.
Max CVSS
5.0
EPSS Score
0.39%
Published
2000-10-13
Updated
2021-06-06
Linux tmpwatch --fuser option allows local users to execute arbitrary commands by creating files whose names contain shell metacharacters.
Max CVSS
2.1
EPSS Score
0.04%
Published
2000-10-06
Updated
2017-10-10
The BAIR program does not properly restrict access to the Internet Explorer Internet options menu, which allows local users to obtain access to the menu by modifying the registry key that starts BAIR.
Max CVSS
3.6
EPSS Score
0.04%
Published
2000-10-20
Updated
2016-10-18
Buffer overflow in bdf program in HP-UX 11.00 may allow local users to gain root privileges via a long -t option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2008-09-05
String parsing error in rpc.kstatd in the linuxnfs or knfsd packages in SuSE and possibly other Linux systems allows remote attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
0.73%
Published
2000-10-20
Updated
2008-09-10
inpview in InPerson in SGI IRIX 5.3 through IRIX 6.5.10 allows local users to gain privileges via a symlink attack on the .ilmpAAA temporary file.
Max CVSS
3.7
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
The truncate function in IRIX 6.x does not properly check for privileges when the file is in the xfs file system, which allows local users to delete the contents of arbitrary files.
Max CVSS
10.0
EPSS Score
0.78%
Published
2000-10-20
Updated
2008-09-05
Buffer overflow in gr_osview in IRIX 6.2 and 6.3 allows local users to gain privileges via a long -D option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
Buffer overflow in dmplay in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long command line option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
Buffer overflow in lpstat in IRIX 6.2 and 6.3 allows local users to gain root privileges via a long -n option.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2008-09-05
Buffer overflow in IRIX libgl.so library allows local users to gain root privileges via a long HOME variable to programs such as (1) gmemusage and (2) gr_osview.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-10-20
Updated
2008-09-05
Norton AntiVirus 5.00.01C with the Novell Netware client does not properly restart the auto-protection service after the first user has logged off of the system.
Max CVSS
10.0
EPSS Score
6.52%
Published
2000-10-20
Updated
2008-09-05
Gnome Lokkit firewall package before 0.41 does not properly restrict access to some ports, even if a user does not make any services available.
Max CVSS
7.5
EPSS Score
0.70%
Published
2000-10-20
Updated
2008-09-05
Trustix installs the httpsd program for Apache-SSL with world-writeable permissions, which allows local users to replace it with a Trojan horse.
Max CVSS
4.6
EPSS Score
0.05%
Published
2000-10-20
Updated
2008-09-05
The web-based folder display capability in Microsoft Internet Explorer 5.5 on Windows 98 allows local users to insert Trojan horse programs by modifying the Folder.htt file and using the InvokeVerb method in the ShellDefView ActiveX control to specify a default execute option for the first file that is listed in the folder.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-10-20
Updated
2017-10-10
WinU 5.x and earlier uses weak encryption to store its configuration password, which allows local users to decrypt the password and gain privileges.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-10-20
Updated
2008-09-05
The Mail Merge tool in Microsoft Word does not prompt the user before executing Visual Basic (VBA) scripts in an Access database, which could allow an attacker to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
0.92%
Published
2000-10-20
Updated
2018-10-12
IRC Xchat client versions 1.4.2 and earlier allows remote attackers to execute arbitrary commands by encoding shell metacharacters into a URL which XChat uses to launch a web browser.
Max CVSS
7.5
EPSS Score
10.99%
Published
2000-10-20
Updated
2008-09-10
GNU userv 1.0.0 and earlier does not properly perform file descriptor swapping, which can corrupt the USERV_GROUPS and USERV_GIDS environmental variables and allow local users to bypass some access restrictions.
Max CVSS
4.6
EPSS Score
0.04%
Published
2000-10-20
Updated
2016-10-18
WircSrv IRC Server 5.07s allows IRC operators to read arbitrary files via the importmotd command, which sets the Message of the Day (MOTD) to the specified file.
Max CVSS
5.0
EPSS Score
1.22%
Published
2000-10-20
Updated
2016-10-18
sshd program in the Rapidstream 2.1 Beta VPN appliance has a hard-coded "rsadmin" account with a null password, which allows remote attackers to execute arbitrary commands via ssh.
Max CVSS
10.0
EPSS Score
0.27%
Published
2000-10-20
Updated
2008-09-05
Watchguard Firebox II allows remote attackers to cause a denial of service by sending a malformed URL to the authentication service on port 4100.
Max CVSS
5.0
EPSS Score
0.67%
Published
2000-10-20
Updated
2017-10-10
netauth.cgi program in Netwin Netauth 4.2e and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Max CVSS
5.0
EPSS Score
1.90%
Published
2000-10-20
Updated
2017-10-10
135 vulnerabilities found
1 2 3 4 5 6
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!