Linux kernel 2.0, 2.2 and 2.4 with syncookies enabled allows remote attackers to bypass firewall rules by brute force guessing the cookie.
Max CVSS
5.0
EPSS Score
0.14%
Published
2001-12-06
Updated
2017-10-10
Format string vulnerability in the error logging code of DHCP server and client in Caldera Linux allows remote attackers to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
0.55%
Published
2001-03-26
Updated
2017-12-19
kdesu program in KDE2 (KDE before 2.2.0-6) does not properly verify the owner of a UNIX socket that is used to send a password, which allows local users to steal passwords and gain privileges.
Max CVSS
2.1
EPSS Score
0.04%
Published
2001-03-26
Updated
2017-10-10
inn 2.2.3 allows local users to overwrite arbitrary files via a symlink attack in some configurations.
Max CVSS
1.2
EPSS Score
0.04%
Published
2001-03-12
Updated
2017-10-10
telnet daemon (telnetd) from the Linux netkit package before netkit-telnet-0.16 allows remote attackers to bypass authentication when telnetd is running with the -L command line option.
Max CVSS
7.5
EPSS Score
0.31%
Published
2001-08-31
Updated
2017-10-10
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
Max CVSS
7.2
EPSS Score
0.04%
Published
2001-01-09
Updated
2017-10-19

CVE-2000-0917

Public exploit
Format string vulnerability in use_syslog() function in LPRng 3.6.24 allows remote attackers to execute arbitrary commands.
Max CVSS
10.0
EPSS Score
95.71%
Published
2000-12-19
Updated
2017-10-10
BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters.
Max CVSS
5.0
EPSS Score
13.68%
Published
2000-07-04
Updated
2017-10-10
8 vulnerabilities found
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!