Exploitdb Exploits

459 exploits tracked across all sources.

Sort: Activity Stars
CVE-2000-1009 EXPLOITDB bash VERIFIED
Red Hat Linux 6.2 - Privilege Escalation
dump in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
by mat
CVE-2000-0972 EXPLOITDB MEDIUM bash VERIFIED
HP-UX 11.00 - Info Disclosure
HP-UX 11.00 crontab allows local users to read arbitrary files via the -e option by creating a symlink to the target file during the crontab session, quitting the session, and reading the error messages that crontab generates.
by dubhe
CVSS 5.5
EIP-2026-102740 EXPLOITDB bash VERIFIED
Slackware Linux - '/usr/bin/ppp-off' Insecure /tmp Call
by sinfony
CVE-2000-1125 EXPLOITDB bash VERIFIED
Red Hat Linux 6.2 - Privilege Escalation
restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
by anonymous
CVE-2000-1095 EXPLOITDB bash VERIFIED
modutils 2.3.x - Command Injection
modprobe in the modutils 2.3.x package on Linux systems allows a local user to execute arbitrary commands via shell metacharacters.
by Michal Zalewski
CVE-2000-1125 EXPLOITDB bash VERIFIED
Red Hat Linux 6.2 - Privilege Escalation
restore 0.4b15 and earlier in Red Hat Linux 6.2 trusts the pathname specified by the RSH environmental variable, which allows local users to obtain root privileges by modifying the RSH variable to point to a Trojan horse program.
by fish
CVE-2000-0935 EXPLOITDB bash VERIFIED
Samba SWAT <2.0.7 - Local File Overwrite
Samba Web Administration Tool (SWAT) in Samba 2.0.7 allows local users to overwrite arbitrary files via a symlink attack on the cgi.log file.
by Optyx
CVE-2000-0936 EXPLOITDB bash VERIFIED
Samba <2.0.7 - Info Disclosure
Samba Web Administration Tool (SWAT) in Samba 2.0.7 installs the cgi.log logging file with world readable permissions, which allows local users to read sensitive information such as user names and passwords.
by miah
CVE-2000-0972 EXPLOITDB MEDIUM bash VERIFIED
HP-UX 11.00 - Info Disclosure
HP-UX 11.00 crontab allows local users to read arbitrary files via the -e option by creating a symlink to the target file during the crontab session, quitting the session, and reading the error messages that crontab generates.
by Kyong-won Cho
CVSS 5.5
EIP-2026-114771 EXPLOITDB bash VERIFIED
ntop 1.x - i Local Format String
by Paul Starzetz
CVE-2000-1072 EXPLOITDB bash VERIFIED
iCal 2.1 - Code Injection
iCal 2.1 Patch 2 installs many files with world-writeable permissions, which allows local users to modify the iCal configuration and execute arbitrary commands by replacing the iplncal.sh program with a Trojan horse.
by @stake
CVE-2000-1074 EXPLOITDB bash VERIFIED
iCal 2.1 Patch 2 - Privilege Escalation
csstart program in iCal 2.1 Patch 2 uses relative pathnames to install the libsocket and libnsl libraries, which could allow the icsuser account to gain root privileges by creating a Trojan Horse library in the current or parent directory.
by @stake
CVE-2000-1027 EXPLOITDB bash VERIFIED
Cisco Secure PIX Firewall 5.2(2) - Info Disclosure
Cisco Secure PIX Firewall 5.2(2) allows remote attackers to determine the real IP address of a target FTP server by flooding the server with PASV requests, which includes the real IP address in the response when passive mode is established.
by Fabio Pietrosanti
CVE-2000-1037 EXPLOITDB bash VERIFIED
Check Point Firewall-1 3.0-4.1 - Info Disclosure
Check Point Firewall-1 session agent 3.0 through 4.1 generates different error messages for invalid user names versus invalid passwords, which allows remote attackers to determine valid usernames and guess a password via a brute force attack.
by Gregory Duchemin
CVE-2000-0992 EXPLOITDB bash VERIFIED
sshd 1.2.xx - Path Traversal
Directory traversal vulnerability in scp in sshd 1.2.xx allows a remote malicious scp server to overwrite arbitrary files via a .. (dot dot) attack.
by Michal Zalewski
CVE-2000-0703 EXPLOITDB bash VERIFIED
suidperl - Privilege Escalation
suidperl (aka sperl) does not properly cleanse the escape sequence "~!" before calling /bin/mail to send an error report, which allows local users to gain privileges by setting the "interactive" environmental variable and calling suidperl with a filename that contains the escape sequence.
by Michal Zalewski
CVE-2000-0695 EXPLOITDB bash VERIFIED
Tech-source Raptor Gfx Pgx32 - Buffer Overflow
Buffer overflows in pgxconfig in the Raptor GFX configuration tool allow local users to gain privileges via command line options.
by suid
CVE-2000-0506 EXPLOITDB bash VERIFIED
Linux Kernel - Denial of Service
The "capabilities" feature in Linux before 2.2.16 allows local users to cause a denial of service or gain privileges by setting the capabilities to prevent a setuid program from dropping privileges, aka the "Linux kernel setuid/setcap vulnerability."
by Wojciech Purczynski
CVE-2000-0530 EXPLOITDB bash VERIFIED
KDE 1.1.2 - Local Privilege Escalation
The KApplication class in the KDE 1.1.2 configuration file management capability allows local users to overwrite arbitrary files.
by IhaQueR
CVE-2000-0257 EXPLOITDB bash VERIFIED
Novell Netware - Buffer Overflow
Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long URL.
by Michal Zalewski
CVE-2000-0187 EXPLOITDB bash VERIFIED
EZShopper 3.0 - Path Traversal
EZShopper 3.0 loadpage.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters.
by suid
CVE-2000-0142 EXPLOITDB bash VERIFIED
Netopia Timbuktu Pro - Denial of Service
The authentication protocol in Timbuktu Pro 2.0b650 allows remote attackers to cause a denial of service via connections to port 407 and 1417.
by eth0
CVE-2000-0052 EXPLOITDB bash VERIFIED
Red Hat userhelper - Privilege Escalation
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack.
by dildog
CVE-2000-1134 EXPLOITDB bash VERIFIED
Unix Shell < - Local File Overwrite
Multiple shell programs on various Unix systems, including (1) tcsh, (2) csh, (3) sh, and (4) bash, follow symlinks when processing << redirects (aka here-documents or in-here documents), which allows local users to overwrite files of other users via a symlink attack.
by proton
CVE-2000-0015 EXPLOITDB bash VERIFIED
CascadeView TFTP Server - Privilege Escalation
CascadeView TFTP server allows local users to gain privileges via a symlink attack.
by Loneguard