[
•
]
NeoSense
E
X
P L O I T S
title
author
type
platform
port
cve
id
search results for » author:
Michal Zalewski
RedHat Linux 6.x - X Font Server Buffer Overflow (Denial of Service)
dos
linux
CVE-2000-0286;OSVDB-1285;CVE-2000-0263
vlad902
UoW IMAPd Serve 10.234/12.264 - COPY Buffer Overflow (Metasploit)
remote
unix
CVE-2000-0284;OSVDB-12037
vlad902
UoW IMAPd Server 10.234/12.264 - LSUB Buffer Overflow (Metasploit)
remote
unix
CVE-2000-0284;OSVDB-12037
patrick
University of Washington - imap LSUB Buffer Overflow (Metasploit)
remote
linux
143.0
CVE-2000-0284;OSVDB-12037
Sean
QSSL QNX 4.25 A - 'crypt()' Local Privilege Escalation
local
qnx
CVE-2000-0250;OSVDB-12211
tombow & Randy Janinda
Dansie Shopping Cart 3.0.4 - Multiple Vulnerabilities
remote
cgi
CVE-2000-0254;OSVDB-38367
Richie & Beto
Microsoft FrontPage 98 Server Extensions for IIS / Microsoft InterDev 1.0 - Remote Buffer Overflow
remote
windows
CVE-2000-0260;OSVDB-282
rain forest puppy
Microsoft FrontPage 98 Server Extensions for IIS / Microsoft InterDev 1.0 - Filename Obfuscation
remote
windows
CVE-2000-0260;OSVDB-282
PErfecto Technology
CNC Technology BizDB 1.0 - 'bizdb-search.cgi' Remote Command Execution
remote
cgi
CVE-2000-0287;OSVDB-291
eAX
AVM KEN! 1.3.10/1.4.30 - Remote Denial of Service
dos
windows
CVE-2000-0262;OSVDB-13157
John P. McNeely
TalentSoft Web+ 4.x - Directory Traversal
remote
cgi
CVE-2000-0282;OSVDB-280
Konstantin Boldyshev
Be BeOS 4.5/5.0 - Invalid System Call
local
beos
CVE-2000-0276;OSVDB-1279
kingpin
CRYPTOCard CRYPTOAdmin 4.1 - Weak Encryption (2)
local
windows
CVE-2000-0275;OSVDB-10054
kingpin
CRYPTOCard CRYPTOAdmin 4.1 - Weak Encryption (1)
local
linux
CVE-2000-0275;OSVDB-10054
Andrey E. Lerman
Bray Systems Linux Trustees 1.5 - Long Pathname
local
linux
CVE-2000-0274;OSVDB-1278
Jim Paris
Cygnus Network Security 4.0/KerbNet 5.0 / MIT Kerberos 4/5 / RedHat 6.2 - Compatibility 'krb_rd_req()' Remote Buffer Overflow (3)
remote
linux
CVE-2000-0389;OSVDB-1339
«
...
2951
2952
2953
2954
2955
2956
2957
2958
2959
2960
2961
...
»
page: 2956/3003 [exploits: 48033]