
CVE-2000-0535
https://notcve.org/view.php?id=CVE-2000-0535
12 Jun 2000 — OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the existence of the /dev/random or /dev/urandom devices, which are absent on FreeBSD Alpha systems, which causes them to produce weak keys which may be more easily broken. • http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html •

CVE-2000-0532
https://notcve.org/view.php?id=CVE-2000-0532
07 Jun 2000 — A FreeBSD patch for SSH on 2000-01-14 configures ssh to listen on port 722 as well as port 22, which might allow remote attackers to access SSH through port 722 even if port 22 is otherwise filtered. • http://archives.neohapsis.com/archives/freebsd/2000-06/0031.html •

CVE-2000-0461
https://notcve.org/view.php?id=CVE-2000-0461
29 May 2000 — The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc •

CVE-2000-0440 – FreeBSD 3.4/4.0/5.0 / NetBSD 1.4 - Unaligned IP Option Denial of Service
https://notcve.org/view.php?id=CVE-2000-0440
01 May 2000 — NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option. • https://www.exploit-db.com/exploits/19896 •

CVE-1999-1008 – xsoldier (FreeBSD 3.3/Linux Mandrake 7.0) - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-1008
18 Apr 2000 — xsoldier program allows local users to gain root access via a long argument. • https://www.exploit-db.com/exploits/19676 •

CVE-2000-0235
https://notcve.org/view.php?id=CVE-2000-0235
27 Mar 2000 — Buffer overflow in the huh program in the orville-write package allows local users to gain root privileges. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:10-orville-write.asc •

CVE-2000-0186
https://notcve.org/view.php?id=CVE-2000-0186
28 Feb 2000 — Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument. • http://www.redhat.com/support/errata/RHSA-2000-100.html •

CVE-2000-0163 – FreeBSD 3.0/3.1/3.2/3.3/3.4 - 'Asmon'/'Ascpu' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0163
21 Feb 2000 — asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file. • https://www.exploit-db.com/exploits/19756 •

CVE-2000-0092
https://notcve.org/view.php?id=CVE-2000-0092
19 Jan 2000 — The BSD make program allows local users to modify files via a symlink attack when the -j option is being used. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc •

CVE-1999-0761
https://notcve.org/view.php?id=CVE-1999-0761
04 Jan 2000 — Buffer overflow in FreeBSD fts library routines allows local user to modify arbitrary files via the periodic program. • http://www.osvdb.org/1074 •