Caucho Technology Resin 1.2 and possibly earlier allows remote attackers to view JSP source via an HTTP request to a .jsp file with certain characters appended to the file name, such as (1) "..", (2) "%2e..", (3) "%81", (4) "%82", and others.
Max CVSS
5.0
EPSS Score
4.22%
Published
2000-11-23
Updated
2017-07-11
quikstore.cgi in Quikstore Shopping Cart allows remote attackers to execute arbitrary commands via shell metacharacters in the URL portion of an HTTP GET request.
Max CVSS
7.5
EPSS Score
0.18%
Published
2000-11-20
Updated
2008-09-05
The -ftrapv compiler option in gcc and g++ 3.3.3 and earlier does not handle all types of integer overflows, which may leave applications vulnerable to vulnerabilities related to overflows.
Max CVSS
7.5
EPSS Score
0.21%
Published
2000-11-01
Updated
2008-09-05
Microsoft Windows 2000 before Service Pack 2 (SP2), when running in a non-Windows 2000 domain and using NTLM authentication, and when credentials of an account are locally cached, allows local users to bypass account lockout policies and make an unlimited number of login attempts, aka the "Domain Account Lockout" vulnerability.
Max CVSS
4.6
EPSS Score
0.23%
Published
2000-11-21
Updated
2019-04-30
Quake 1 (quake1) and ProQuake 1.01 and earlier allow remote attackers to cause a denial of service via a malformed (empty) UDP packet.
Max CVSS
5.0
EPSS Score
0.94%
Published
2000-11-01
Updated
2017-10-10
The default configuration of mod_perl for Apache as installed on Mandrake Linux 6.1 through 7.1 sets the /perl/ directory to be browseable, which allows remote attackers to list the contents of that directory.
Max CVSS
5.0
EPSS Score
0.80%
Published
2000-11-14
Updated
2017-10-10
Intel Express 500 series switches allow a remote attacker to cause a denial of service via a malformed ICMP packet, which causes the CPU to crash.
Max CVSS
5.0
EPSS Score
0.29%
Published
2000-11-14
Updated
2008-09-05
The mailto CGI script allows remote attacker to execute arbitrary commands via shell metacharacters in the emailadd form field.
Max CVSS
7.5
EPSS Score
0.77%
Published
2000-11-14
Updated
2017-10-10
mailform.pl CGI script in MailForm 2.0 allows remote attackers to read arbitrary files by specifying the file name in the XX-attach_file parameter, which MailForm then sends to the attacker.
Max CVSS
5.0
EPSS Score
0.47%
Published
2000-11-14
Updated
2017-10-10
WFTPD and WFTPD Pro 2.41 RC12 allows remote attackers to obtain the full pathname of the server via a "%C" command, which generates an error message that includes the pathname.
Max CVSS
5.0
EPSS Score
0.44%
Published
2000-11-14
Updated
2017-10-10
WFTPD and WFTPD Pro 2.41 RC12 allows remote attackers to cause a denial of service by sending a long string of unprintable characters.
Max CVSS
5.0
EPSS Score
1.12%
Published
2000-11-14
Updated
2017-10-10
Eudora mail client includes the absolute path of the sender's host within a virtual card (VCF).
Max CVSS
5.0
EPSS Score
0.25%
Published
2000-11-14
Updated
2017-10-10
explorer.php in PhotoAlbum 0.9.9 allows remote attackers to read arbitrary files via a .. (dot dot) attack.
Max CVSS
5.0
EPSS Score
2.67%
Published
2000-11-14
Updated
2017-12-19
Buffer overflow in EFTP allows remote attackers to cause a denial of service by sending a string that does not contain a newline, then disconnecting from the server.
Max CVSS
5.0
EPSS Score
1.17%
Published
2000-11-14
Updated
2017-10-10
Buffer overflow in EFTP allows remote attackers to cause a denial of service via a long string.
Max CVSS
7.5
EPSS Score
1.04%
Published
2000-11-14
Updated
2017-10-10
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 enables WebDAV, which allows remote attackers to list arbitrary directories via the PROPFIND HTTP request method.
Max CVSS
5.0
EPSS Score
1.47%
Published
2000-11-14
Updated
2017-10-10
The default configuration of Apache 1.3.12 in SuSE Linux 6.4 allows remote attackers to read source code for CGI scripts by replacing the /cgi-bin/ in the requested URL with /cgi-bin-sdb/.
Max CVSS
5.0
EPSS Score
88.95%
Published
2000-11-14
Updated
2017-10-10
Kernel logging daemon (klogd) in Linux does not properly cleanse user-injected format strings, which allows local users to gain root privileges by triggering malformed kernel messages.
Max CVSS
7.2
EPSS Score
0.16%
Published
2000-11-14
Updated
2018-05-03
Buffer overflow in dvtermtype in Tridia Double Vision 3.07.00 allows local users to gain root privileges via a long terminal type argument.
Max CVSS
7.2
EPSS Score
0.04%
Published
2000-11-14
Updated
2017-10-10
Race condition in the creation of a Unix domain socket in GNOME esound 0.2.19 and earlier allows a local user to change the permissions of arbitrary files and directories, and gain additional privileges, via a symlink attack.
Max CVSS
6.2
EPSS Score
0.04%
Published
2000-11-14
Updated
2017-10-10
Buffer overflow in listmanager earlier than 2.105.1 allows local users to gain additional privileges.
Max CVSS
7.2
EPSS Score
0.05%
Published
2000-11-14
Updated
2017-10-10
Vulnerability in an administrative interface utility for Allaire Spectra 1.0.1 allows remote attackers to read and modify sensitive configuration information.
Max CVSS
6.4
EPSS Score
0.58%
Published
2000-11-14
Updated
2017-10-10
Mailman 1.1 allows list administrators to execute arbitrary commands via shell metacharacters in the %(listname) macro expansion.
Max CVSS
7.2
EPSS Score
0.11%
Published
2000-11-14
Updated
2017-10-10
The file upload capability in PHP versions 3 and 4 allows remote attackers to read arbitrary files by setting hidden form fields whose names match the names of internal PHP script variables.
Max CVSS
5.0
EPSS Score
0.83%
Published
2000-11-14
Updated
2017-10-10
The web configuration server for NTMail V5 and V6 allows remote attackers to cause a denial of service via a series of partial HTTP requests.
Max CVSS
5.0
EPSS Score
0.67%
Published
2000-11-14
Updated
2017-10-10
66 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!