CVE-2001-0331
https://notcve.org/view.php?id=CVE-2001-0331
Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P http://www.kb.cert.org/vuls/id/258632 http://www.osvdb.org/1822 http://www.securityfocus.com/bid/2714 http://xforce.iss.net/alerts/advise76.php https://exchange.xforce.ibmcloud.com/vulnerabilities/6502 •
CVE-2001-0247 – FreeBSD 2.2-4.2 / NetBSD 1.2-4.5 / OpenBSD 2.x - FTPd 'glob()' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2001-0247
Buffer overflows in BSD-based FTP servers allows remote attackers to execute arbitrary commands via a long pattern string containing a {} sequence, as seen in (1) g_opendir, (2) g_lstat, (3) g_stat, and (4) the glob0 buffer as used in the glob functions glob2 and glob3. • https://www.exploit-db.com/exploits/20731 https://www.exploit-db.com/exploits/20732 https://www.exploit-db.com/exploits/20733 ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-018.txt.asc ftp://patches.sgi.com/support/free/security/advisories/20010802-01-P http://archives.neohapsis.com/archives/freebsd/2001-04/0466.html http://www.cert.org/advisories/CA-2001-07.html http://www.nai.com/research/covert/advisories/048.asp http://www.securityfocus.com •
CVE-2000-0733 – IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String
https://notcve.org/view.php?id=CVE-2000-0733
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. • https://www.exploit-db.com/exploits/20149 ftp://sgigate.sgi.com/security/20000801-02-P http://archives.neohapsis.com/archives/bugtraq/2000-08/0154.html http://www.securityfocus.com/bid/1572 •
CVE-2000-0245 – SGI IRIX 5.x/6.x - Objectserver
https://notcve.org/view.php?id=CVE-2000-0245
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts. • https://www.exploit-db.com/exploits/19822 ftp://sgigate.sgi.com/security/20000303-01-PX http://www.ciac.org/ciac/bulletins/k-030.shtml http://www.osvdb.org/1267 http://www.securityfocus.com/bid/1079 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003290852.aa27218%40blaze.arl.mil https://exchange.xforce.ibmcloud.com/vulnerabilities/4206 •
CVE-1999-1102
https://notcve.org/view.php?id=CVE-1999-1102
lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times. • http://ciac.llnl.gov/ciac/bulletins/e-25.shtml http://www.aenigma.net/resources/maillist/bugtraq/1994/0091.htm http://www.phreak.org/archives/security/8lgm/8lgm.lpr •