CVE-2000-0052 – Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path
https://notcve.org/view.php?id=CVE-2000-0052
Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack. • https://www.exploit-db.com/exploits/19709 https://www.exploit-db.com/exploits/19710 http://www.l0pht.com/advisories/pam_advisory http://www.redhat.com/support/errata/RHSA-2000-001.html http://www.securityfocus.com/bid/913 http://xforce.iss.net/search.php3?type=2&pattern=linux-pam-userhelper •
CVE-1999-1330
https://notcve.org/view.php?id=CVE-1999-1330
The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf. • http://lists.openresources.com/Debian/debian-bugs-closed/msg00581.html http://marc.info/?l=bugtraq&m=87602661419259&w=2 http://www.iss.net/security_center/static/7244.php http://www.redhat.com/support/errata/rh42-errata-general.html#db •
CVE-1999-1331
https://notcve.org/view.php?id=CVE-1999-1331
netcfg 2.16-1 in Red Hat Linux 4.2 allows the Ethernet interface to be controlled by users on reboot when an option is set, which allows local users to cause a denial of service by shutting down the interface. • http://www.iss.net/security_center/static/7245.php http://www.redhat.com/support/errata/rh42-errata-general.html#netcfg •
CVE-1999-0704 – BSD/OS 3.1/4.0.1 / FreeBSD 3.0/3.1/3.2 / RedHat Linux 6.0 - 'amd' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0704
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. • https://www.exploit-db.com/exploits/19478 https://www.exploit-db.com/exploits/19479 http://www.securityfocus.com/bid/614 •
CVE-1999-0872
https://notcve.org/view.php?id=CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. • http://www.securityfocus.com/bid/611 http://www.securityfocus.com/bid/759 •