Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code. NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache. The printenv.pl/acuparam vector, discloser on 20070724, is one such variant.
Max CVSS
4.3
EPSS Score
0.26%
Published
2000-02-01
Updated
2021-06-06
Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID.
Max CVSS
3.6
EPSS Score
1.24%
Published
2000-02-06
Updated
2017-10-10
Selena Sol WebBanner 4.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Max CVSS
5.1
EPSS Score
0.73%
Published
2000-02-02
Updated
2008-09-10
The installation for Windows 2000 does not activate the Administrator password until the system has rebooted, which allows remote attackers to connect to the ADMIN$ share without a password until the reboot occurs.
Max CVSS
10.0
EPSS Score
2.72%
Published
2000-02-15
Updated
2019-04-30
The Nautica Marlin bridge allows remote attackers to cause a denial of service via a zero length UDP packet to the SNMP port.
Max CVSS
5.0
EPSS Score
0.85%
Published
2000-02-25
Updated
2008-09-10
ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event.
Max CVSS
5.0
EPSS Score
0.87%
Published
2000-02-24
Updated
2022-08-17
Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-02-23
Updated
2015-11-04
Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-02-03
Updated
2008-09-10
The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program.
Max CVSS
5.1
EPSS Score
0.60%
Published
2000-02-24
Updated
2008-09-10
Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list.
Max CVSS
5.0
EPSS Score
0.67%
Published
2000-02-29
Updated
2008-09-10
Vulnerability in SCO cu program in UnixWare 7.x allows local users to gain privileges.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-02-08
Updated
2008-09-10
FTP Explorer uses weak encryption for storing the username, password, and profile of FTP sites.
Max CVSS
4.6
EPSS Score
0.05%
Published
2000-02-24
Updated
2008-09-10
The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters.
Max CVSS
5.0
EPSS Score
1.20%
Published
2000-02-23
Updated
2008-09-10
InterAccess TelnetD Server 4.0 allows remote attackers to conduct a denial of service via malformed terminal client configuration information.
Max CVSS
5.0
EPSS Score
0.94%
Published
2000-02-24
Updated
2018-05-03
The Windows Media server allows remote attackers to cause a denial of service via a series of client handshake packets that are sent in an improper sequence, aka the "Misordered Windows Media Services Handshake" vulnerability.
Max CVSS
5.0
EPSS Score
8.35%
Published
2000-02-23
Updated
2018-10-12
Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page.
Max CVSS
7.6
EPSS Score
0.17%
Published
2000-02-27
Updated
2008-09-10
The htdig (ht://Dig) CGI program htsearch allows remote attackers to read arbitrary files by enclosing the file name with backticks (`) in parameters to htsearch.
Max CVSS
5.0
EPSS Score
14.10%
Published
2000-02-29
Updated
2008-09-10
The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%.
Max CVSS
5.0
EPSS Score
3.72%
Published
2000-02-28
Updated
2008-09-10
The Trend Micro OfficeScan client tmlisten.exe allows remote attackers to cause a denial of service via malformed data to port 12345.
Max CVSS
5.0
EPSS Score
0.94%
Published
2000-02-28
Updated
2008-09-10
The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file.
Max CVSS
4.6
EPSS Score
0.07%
Published
2000-02-14
Updated
2008-09-10
Buffer overflow in mhshow in the Linux nmh package allows remote attackers to execute commands via malformed MIME headers in an email message.
Max CVSS
7.5
EPSS Score
0.45%
Published
2000-02-28
Updated
2008-09-10
setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-02-24
Updated
2008-09-10
buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-02-24
Updated
2008-09-10
Axis StorPoint CD allows remote attackers to access administrator URLs without authentication via a .. (dot dot) attack.
Max CVSS
10.0
EPSS Score
2.28%
Published
2000-02-29
Updated
2008-09-10
EZShopper 3.0 search.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters.
Max CVSS
7.5
EPSS Score
0.27%
Published
2000-02-27
Updated
2008-09-10
83 vulnerabilities found
1 2 3 4
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!