Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems.
Max CVSS
10.0
EPSS Score
2.08%
Published
1998-10-12
Updated
2009-01-26
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
Max CVSS
10.0
EPSS Score
9.01%
Published
1998-04-08
Updated
2018-10-30
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
Max CVSS
10.0
EPSS Score
1.15%
Published
1998-04-08
Updated
2018-10-30
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
Max CVSS
10.0
EPSS Score
11.30%
Published
1997-04-07
Updated
2022-08-17
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
Max CVSS
10.0
EPSS Score
0.83%
Published
1996-12-04
Updated
2022-08-17
Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable.
Max CVSS
10.0
EPSS Score
4.53%
Published
1997-10-18
Updated
2022-08-17
Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto.
Max CVSS
10.0
EPSS Score
8.59%
Published
1999-02-09
Updated
2022-08-17
Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type.
Max CVSS
10.0
EPSS Score
0.37%
Published
1998-12-04
Updated
2016-10-18
Red Hat pump DHCP client allows remote attackers to gain root access in some configurations.
Max CVSS
10.0
EPSS Score
0.73%
Published
1999-08-11
Updated
2008-09-09
Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname.
Max CVSS
10.0
EPSS Score
0.60%
Published
1999-11-09
Updated
2008-09-09
Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals.
Max CVSS
10.0
EPSS Score
1.06%
Published
2000-01-04
Updated
2022-08-17
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.
Max CVSS
10.0
EPSS Score
0.91%
Published
1997-02-03
Updated
2016-10-18
RPMMail before 1.4 allows remote attackers to execute commands via an e-mail message with shell metacharacters in the "MAIL FROM" command.
Max CVSS
10.0
EPSS Score
0.99%
Published
1999-10-04
Updated
2017-10-10
Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter.
Max CVSS
10.0
EPSS Score
4.53%
Published
1999-12-21
Updated
2022-08-17
An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5.
Max CVSS
10.0
EPSS Score
0.44%
Published
2000-01-21
Updated
2022-08-17

CVE-2000-0248

Public exploit
The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
1.33%
Published
2000-04-24
Updated
2008-09-10

CVE-2000-0322

Public exploit
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters.
Max CVSS
10.0
EPSS Score
23.67%
Published
2000-04-24
Updated
2016-09-17
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
3.70%
Published
2000-05-16
Updated
2020-01-21
Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
1.90%
Published
2000-05-16
Updated
2020-01-21
Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
1.90%
Published
2000-05-16
Updated
2020-01-21
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges.
Max CVSS
10.0
EPSS Score
8.05%
Published
2000-07-16
Updated
2018-05-03
Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen.
Max CVSS
10.0
EPSS Score
0.48%
Published
2000-11-14
Updated
2018-10-30

CVE-2000-0917

Public exploit
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
95.71%
Published
2000-12-19
Updated
2017-10-10
Format string vulnerability in talkd in OpenBSD and possibly other BSD-based OSes allows remote attackers to execute arbitrary commands via a user name that contains format characters.
Max CVSS
10.0
EPSS Score
0.54%
Published
2000-12-11
Updated
2017-10-10
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file.
Max CVSS
10.0
EPSS Score
1.07%
Published
2000-01-08
Updated
2017-07-11
38 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!