Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2000-0697

5 documents5 sources
Severity
10.0CRITICAL
EPSS
7.1%
top 8.47%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 20
Latest updateFeb 7

Description

The administration interface for the dwhttpd web server in Solaris AnswerBook2 allows interface users to remotely execute commands via shell metacharacters.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

NVDsun/solaris_answerbook24 versions+3

Patches

🔴Vulnerability Details

2
GHSA
GHSA-h9pf-v244-3x9w: The administration interface for the dwhttpd web server in Solaris AnswerBook2 allows interface users to remotely execute commands via shell metachara2022-04-30
CVEList
CVE-2000-0697: The administration interface for the dwhttpd web server in Solaris AnswerBook2 allows interface users to remotely execute commands via shell metachara2000-09-21

💥Exploits & PoCs

1
Exploit-DB
Solaris AnswerBook2 - Remote Command Execution2000-08-07

📋Vendor Advisories

1
Chrome
Stable Channel Update for Desktop: CVE-2023-06962023-02-07
CVE-2000-0697 (CRITICAL CVSS 10) | The administration interface for th | cvebase.io