CVE-2000-0749
https://notcve.org/view.php?id=CVE-2000-0749
Buffer overflow in the Linux binary compatibility module in FreeBSD 3.x through 5.x allows local users to gain root privileges via long filenames in the linux shadow file system. • http://archives.neohapsis.com/archives/freebsd/2000-08/0338.html http://www.osvdb.org/1536 http://www.securityfocus.com/bid/1628 https://exchange.xforce.ibmcloud.com/vulnerabilities/5968 •
CVE-2000-0752
https://notcve.org/view.php?id=CVE-2000-0752
Buffer overflows in brouted in FreeBSD and possibly other OSes allows local users to gain root privileges via long command line arguments. • http://archives.neohapsis.com/archives/freebsd/2000-08/0339.html http://www.securityfocus.com/bid/1629 •
CVE-2000-0595
https://notcve.org/view.php?id=CVE-2000-0595
libedit searches for the .editrc file in the current directory instead of the user's home directory, which may allow local users to execute arbitrary commands by installing a modified .editrc in another directory. • http://archives.neohapsis.com/archives/freebsd/2000-07/0035.html http://www.osvdb.org/1446 http://www.securityfocus.com/bid/1437 •
CVE-2000-0594 – BitchX IRC Client 75p1/75p3/1.0 c16 - '/INVITE' Format String
https://notcve.org/view.php?id=CVE-2000-0594
BitchX IRC client does not properly cleanse an untrusted format string, which allows remote attackers to cause a denial of service via an invite to a channel whose name includes special formatting characters. • https://www.exploit-db.com/exploits/20060 http://archives.neohapsis.com/archives/bugtraq/2000-07/0026.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0098.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0105.html http://archives.neohapsis.com/archives/freebsd/2000-07/0042.html http://archives.neohapsis.com/archives/vuln-dev/2000-q3/0018.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-022.0.txt http://www.redhat.com/support/errata/RHSA •
CVE-2000-0535
https://notcve.org/view.php?id=CVE-2000-0535
OpenSSL 0.9.4 and OpenSSH for FreeBSD do not properly check for the existence of the /dev/random or /dev/urandom devices, which are absent on FreeBSD Alpha systems, which causes them to produce weak keys which may be more easily broken. • http://archives.neohapsis.com/archives/freebsd/2000-06/0083.html http://www.securityfocus.com/bid/1340 •