Export limit exceeded: 29918 CVEs match your query. Please refine your search to export 10,000 CVEs or fewer.
Search
Search Results (29918 CVEs found)
| CVE | Vendors | Products | Updated | CVSS v3.1 |
|---|---|---|---|---|
| CVE-2000-1121 | 1 Ibm | 1 Aix | 2026-04-16 | N/A |
| Buffer overflow in enq command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long -M argument. | ||||
| CVE-2000-1122 | 1 Ibm | 1 Aix | 2026-04-16 | N/A |
| Buffer overflow in setclock command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands via a long argument. | ||||
| CVE-2000-1123 | 1 Ibm | 1 Aix | 2026-04-16 | N/A |
| Buffer overflow in pioout command in IBM AIX 4.3.x and earlier may allow local users to execute arbitrary commands. | ||||
| CVE-2000-1124 | 1 Ibm | 1 Aix | 2026-04-16 | N/A |
| Buffer overflow in piobe command in IBM AIX 4.3.x allows local users to gain privileges via long environmental variables. | ||||
| CVE-2000-1125 | 1 Redhat | 1 Linux | 2026-04-16 | N/A |
| restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program. | ||||
| CVE-2000-1126 | 1 Hp | 1 Hp-ux | 2026-04-16 | N/A |
| Vulnerability in auto_parms and set_parms in HP-UX 11.00 and earlier allows remote attackers to execute arbitrary commands or cause a denial of service. | ||||
| CVE-2000-1127 | 1 Hp | 1 Hp-ux | 2026-04-16 | N/A |
| registrar in the HP resource monitor service allows local users to read and modify arbitrary files by renaming the original registrar.log log file and creating a symbolic link to the target file, to which registrar appends log information and sets the permissions to be world readable. | ||||
| CVE-2000-1128 | 1 Mcafee | 1 Virusscan | 2026-04-16 | N/A |
| The default configuration of McAfee VirusScan 4.5 does not quote the ImagePath variable, which improperly sets the search path and allows local users to place a Trojan horse "common.exe" program in the C:\Program Files directory. | ||||
| CVE-2000-1130 | 1 Network Associates | 1 Webshield Smtp | 2026-04-16 | N/A |
| McAfee WebShield SMTP 4.5 allows remote attackers to bypass email content filtering rules by including Extended ASCII characters in name of the attachment. | ||||
| CVE-2000-1131 | 1 Bill Kendrick | 1 Gbook.cgi | 2026-04-16 | N/A |
| Bill Kendrick web site guestbook (GBook) allows remote attackers to execute arbitrary commands via shell metacharacters in the _MAILTO form variable. | ||||
| CVE-2000-1132 | 1 Dcscripts | 1 Dcforum | 2026-04-16 | N/A |
| DCForum cgforum.cgi CGI script allows remote attackers to read arbitrary files, and delete the program itself, via a malformed "forum" variable. | ||||
| CVE-2000-1135 | 1 Debian | 1 Debian Linux | 2026-04-16 | N/A |
| fshd (fsh daemon) in Debian GNU/Linux allows local users to overwrite files of other users via a symlink attack. | ||||
| CVE-2000-1136 | 1 Debian | 1 Elvis Tiny | 2026-04-16 | N/A |
| elvis-tiny before 1.4-10 in Debian GNU/Linux, and possibly other Linux operating systems, allows local users to overwrite files of other users via a symlink attack. | ||||
| CVE-2000-1137 | 2 Gnu, Redhat | 2 Ed, Linux | 2026-04-16 | N/A |
| GNU ed before 0.2-18.1 allows local users to overwrite the files of other users via a symlink attack. | ||||
| CVE-2000-1138 | 1 Ibm | 1 Lotus Notes | 2026-04-16 | N/A |
| Lotus Notes R5 client R5.0.5 and earlier does not properly warn users when an S/MIME email message has been modified, which could allow an attacker to modify the email in transit without being detected. | ||||
| CVE-2000-1140 | 1 Recourse Technologies | 1 Mantrap | 2026-04-16 | N/A |
| Recourse ManTrap 1.6 does not properly hide processes from attackers, which could allow attackers to determine that they are in a honeypot system by comparing the results from kill commands with the process listing in the /proc filesystem. | ||||
| CVE-2000-1141 | 1 Recourse Technologies | 1 Mantrap | 2026-04-16 | N/A |
| Recourse ManTrap 1.6 modifies the kernel so that ".." does not appear in the /proc listing, which allows attackers to determine that they are in a honeypot system. | ||||
| CVE-2000-1143 | 1 Recourse Technologies | 1 Mantrap | 2026-04-16 | N/A |
| Recourse ManTrap 1.6 hides the first 4 processes that run on a Solaris system, which allows attackers to determine that they are in a honeypot system. | ||||
| CVE-2000-1144 | 1 Recourse Technologies | 1 Mantrap | 2026-04-16 | N/A |
| Recourse ManTrap 1.6 sets up a chroot environment to hide the fact that it is running, but the inode number for the resulting "/" file system is higher than normal, which allows attackers to determine that they are in a chroot environment. | ||||
| CVE-2000-1145 | 1 Recourse Technologies | 1 Mantrap | 2026-04-16 | N/A |
| Recourse ManTrap 1.6 allows attackers who have gained root access to use utilities such as crash or fsdb to read /dev/mem and raw disk devices to identify ManTrap processes or modify arbitrary data files. | ||||