CVE-2000-0998 – FreeBSD 3.5/4.x - '/usr/bin/top' Format String
https://notcve.org/view.php?id=CVE-2000-0998
Format string vulnerability in top program allows local attackers to gain root privileges via the "kill" or "renice" function. • https://www.exploit-db.com/exploits/20377 https://www.exploit-db.com/exploits/20378 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:62.top.v1.1.asc ftp://ftp.openbsd.org/pub/OpenBSD/patches/2.7/common/028_format_strings.patch http://www.securityfocus.com/bid/1895 •
CVE-2000-0916 – Linux Kernel 2.2 - Predictable TCP Initial Sequence Number
https://notcve.org/view.php?id=CVE-2000-0916
FreeBSD 4.1.1 and earlier, and possibly other BSD-based OSes, uses an insufficient random number generator to generate initial TCP sequence numbers (ISN), which allows remote attackers to spoof TCP connections. • https://www.exploit-db.com/exploits/19522 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:52.tcp-iss.asc http://www.securityfocus.com/bid/1766 •
CVE-2000-0963
https://notcve.org/view.php?id=CVE-2000-0963
Buffer overflow in ncurses library allows local users to execute arbitrary commands via long environmental information such as TERM or TERMINFO_DIRS. • http://www.calderasystems.com/support/security/advisories/CSSA-2000-036.0.txt http://www.securityfocus.com/archive/1/138550 http://www.securityfocus.com/bid/1142 https://exchange.xforce.ibmcloud.com/vulnerabilities/44487 •
CVE-2000-1012
https://notcve.org/view.php?id=CVE-2000-1012
The catopen function in FreeBSD 5.0 and earlier, and possibly other OSes, allows local users to read arbitrary files via the LANG environmental variable. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:53.catopen.asc •
CVE-2000-0852
https://notcve.org/view.php?id=CVE-2000-0852
Multiple buffer overflows in eject on FreeBSD and possibly other OSes allows local users to gain root privileges. • http://archives.neohapsis.com/archives/freebsd/2000-09/0110.html http://www.osvdb.org/1559 http://www.securityfocus.com/bid/1686 https://exchange.xforce.ibmcloud.com/vulnerabilities/5248 •