
CVE-2001-0284
https://notcve.org/view.php?id=CVE-2001-0284
03 May 2001 — Buffer overflow in IPSEC authentication mechanism for OpenBSD 2.8 and earlier allows remote attackers to cause a denial of service and possibly execute arbitrary commands via a malformed Authentication header (AH) IPv4 option. • http://www.openbsd.org/errata.html#ipsec_ah •

CVE-2001-0268
https://notcve.org/view.php?id=CVE-2001-0268
03 May 2001 — The i386_set_ldt system call in NetBSD 1.5 and earlier, and OpenBSD 2.8 and earlier, when the USER_LDT kernel option is enabled, does not validate a call gate target, which allows local users to gain root privileges by creating a segment call gate in the Local Descriptor Table (LDT) with a target that specifies an arbitrary kernel address. • http://archives.neohapsis.com/archives/bugtraq/2001-02/0353.html •

CVE-2001-0144 – SSH (x2) - Remote Command Execution
https://notcve.org/view.php?id=CVE-2001-0144
12 Mar 2001 — CORE SDI SSH1 CRC-32 compensation attack detector allows remote attackers to execute arbitrary commands on an SSH server or client via an integer overflow. • https://www.exploit-db.com/exploits/349 •

CVE-2000-0310
https://notcve.org/view.php?id=CVE-2000-0310
12 Mar 2001 — IP fragment assembly in OpenBSD 2.4 allows a remote attacker to cause a denial of service by sending a large number of fragmented packets. • http://www.openbsd.org/errata24.html#maxqueue •

CVE-2000-0309
https://notcve.org/view.php?id=CVE-2000-0309
12 Mar 2001 — The i386 trace-trap handling in OpenBSD 2.4 with DDB enabled allows a local user to cause a denial of service. • http://www.openbsd.org/errata24.html#trctrap •

CVE-2000-0313
https://notcve.org/view.php?id=CVE-2000-0313
12 Mar 2001 — Vulnerability in OpenBSD 2.6 allows a local user to change interface media configurations. • http://www.openbsd.org/errata.html#ifmedia •

CVE-2000-0312
https://notcve.org/view.php?id=CVE-2000-0312
14 Feb 2001 — cron in OpenBSD 2.5 allows local users to gain root privileges via an argv[] that is not NULL terminated, which is passed to cron's fake popen function. • http://www.openbsd.org/errata25.html#cron •

CVE-2001-0053 – OpenBSD ftpd 2.6/2.7 - Remote Overflow
https://notcve.org/view.php?id=CVE-2001-0053
12 Feb 2001 — One-byte buffer overflow in replydirname function in BSD-based ftpd allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/234 •

CVE-2000-1169
https://notcve.org/view.php?id=CVE-2000-1169
09 Jan 2001 — OpenSSH SSH client before 2.3.0 does not properly disable X11 or agent forwarding, which could allow a malicious SSH server to gain access to the X11 display and sniff X11 events, or gain access to the ssh-agent. • http://archives.neohapsis.com/archives/bugtraq/2000-11/0195.html •

CVE-2000-0994 – OpenBSD 2.x - 'fstat' Format String
https://notcve.org/view.php?id=CVE-2000-0994
19 Dec 2000 — Format string vulnerability in OpenBSD fstat program (and possibly other BSD-based operating systems) allows local users to gain root privileges via the PWD environmental variable. • https://www.exploit-db.com/exploits/20256 •