Exploitdb Exploits

3,149 exploits tracked across all sources.

Sort: Activity Stars
CVE-2000-0440 EXPLOITDB c VERIFIED
Freebsd - Denial of Service
NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option.
by y3t1
CVE-2000-0378 EXPLOITDB c VERIFIED
Linux pam_console - Info Disclosure
The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in.
by Michal Zalewski
CVE-2000-0347 EXPLOITDB c VERIFIED
Microsoft Windows 95 - Denial of Service
Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name.
by rain forest puppy
CVE-2000-0343 EXPLOITDB c VERIFIED
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by MaXX
CVE-2000-0343 EXPLOITDB c VERIFIED
Brecht Claerhout Sniffit - Buffer Overflow
Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header.
by FuSyS
CVE-2000-0425 EXPLOITDB c VERIFIED
Lsoft Listserv - Buffer Overflow
Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands.
by David Litchfield
CVE-2000-0340 EXPLOITDB c VERIFIED
Suse Linux - Buffer Overflow
Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable.
by bladi
CVE-2000-0337 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter.
by DiGiT
CVE-2000-0316 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option.
by DiGiT
CVE-2000-0317 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
CVE-2000-0317 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by Theodor Ragnar Gislason
CVE-2000-0317 EXPLOITDB c VERIFIED
SUN Solaris - Buffer Overflow
Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option.
by DiGiT
CVE-2000-0527 EXPLOITDB c VERIFIED
MailStudio 2000 <2.0 - RCE
userreg.cgi CGI program in MailStudio 2000 2.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters.
by fygrave
CVE-2000-0295 EXPLOITDB c VERIFIED
Lcdproc - Buffer Overflow
Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command.
by Andrew Hobgood
EIP-2026-117580 EXPLOITDB c VERIFIED
Microsoft Windows Server 2000/95/98/NT 4.0 - Long Filename Extension
by Laurent Eschenauer
CVE-2000-0286 EXPLOITDB c VERIFIED
Redhat Linux - Denial of Service
X fontserver xfs allows local users to cause a denial of service via malformed input to the server.
by Michal Zalewski
CVE-2000-0250 EXPLOITDB c VERIFIED
QNX - Info Disclosure
The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords.
by Sean
CVE-2000-0275 EXPLOITDB c VERIFIED
CRYPTOCard CryptoAdmin for PalmOS - Info Disclosure
CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN.
by kingpin
CVE-2000-0274 EXPLOITDB c VERIFIED
Bray Systems Linux Trustees - Denial of Service
The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name.
by Andrey E. Lerman
CVE-2000-0389 EXPLOITDB c VERIFIED
Cygnus Network Security - Buffer Overflow
Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges.
by Jim Paris
CVE-2000-0300 EXPLOITDB c VERIFIED
PcAnywhere 9.x - Info Disclosure
The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts.
by Pascal Longpre
CVE-2000-1196 EXPLOITDB c VERIFIED
Netscape PublishingXpert <2.5 - Info Disclosure
PSCOErrPage.htm in Netscape PublishingXpert 2.5 before SP2 allows remote attackers to read arbitrary files by specifying the target file in the errPagePath parameter.
by \x00\x00
CVE-2000-0244 EXPLOITDB c VERIFIED
Citrix ICA - Info Disclosure
The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication.
by Dug Song
CVE-2000-0245 EXPLOITDB c VERIFIED
SGI IRIX - Privilege Escalation
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts.
by Last Stage of Delirium
CVE-2000-0227 EXPLOITDB c VERIFIED
Linux Kernel - Denial of Service
The Linux 2.2.x kernel does not restrict the number of Unix domain sockets as defined by the wmem_max parameter, which allows local users to cause a denial of service by requesting a large number of sockets.
by Jay Fenlason