CVE-2000-0194 – Corel Linux OS 1.0 - buildxconfig
https://notcve.org/view.php?id=CVE-2000-0194
24 Feb 2000 — buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters. • https://www.exploit-db.com/exploits/19764 •
CVE-2000-0195 – Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0195
24 Feb 2000 — setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file. • https://www.exploit-db.com/exploits/19765 •
CVE-2000-0219 – RedHat Linux 6.0 - Single User Mode Authentication
https://notcve.org/view.php?id=CVE-2000-0219
23 Feb 2000 — Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt. • https://www.exploit-db.com/exploits/19763 • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2000-0093
https://notcve.org/view.php?id=CVE-2000-0093
21 Jan 2000 — An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0093 •
CVE-2000-0048 – Corel Linux OS 1.0 - get_it PATH
https://notcve.org/view.php?id=CVE-2000-0048
12 Jan 2000 — get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program. • https://www.exploit-db.com/exploits/19723 •
CVE-2000-1220 – BSD / Linux - 'lpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1220
08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 •
CVE-2000-1221 – RedHat 6.1 / IRIX 6.5.18 - 'lpd' Command Execution
https://notcve.org/view.php?id=CVE-2000-1221
08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 •
CVE-1999-0706
https://notcve.org/view.php?id=CVE-1999-0706
04 Jan 2000 — Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables. • http://www.securityfocus.com/bid/583 •
CVE-2000-0052 – Mandrake 6.x / RedHat 6.x / Turbolinux 3.5 b2/4.x/6.0.2 userhelper/PAM - Path
https://notcve.org/view.php?id=CVE-2000-0052
04 Jan 2000 — Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack. • https://www.exploit-db.com/exploits/19709 •
CVE-1999-1327
https://notcve.org/view.php?id=CVE-1999-1327
31 Dec 1999 — Buffer overflow in linuxconf 1.11r11-rh2 on Red Hat Linux 5.1 allows local users to gain root privileges via a long LANG environmental variable. • http://marc.info/?l=bugtraq&m=90221103125826&w=2 •