CVE-2000-0733 – IRIX 5.2/5.3/6.x - TelnetD Environment Variable Format String
https://notcve.org/view.php?id=CVE-2000-0733
Telnetd telnet server in IRIX 5.2 through 6.1 does not properly cleans user-injected format strings, which allows remote attackers to execute arbitrary commands via a long RLD variable in the IAC-SB-TELOPT_ENVIRON request. • https://www.exploit-db.com/exploits/20149 ftp://sgigate.sgi.com/security/20000801-02-P http://archives.neohapsis.com/archives/bugtraq/2000-08/0154.html http://www.securityfocus.com/bid/1572 •
CVE-2000-0245 – SGI IRIX 5.x/6.x - Objectserver
https://notcve.org/view.php?id=CVE-2000-0245
Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts. • https://www.exploit-db.com/exploits/19822 ftp://sgigate.sgi.com/security/20000303-01-PX http://www.ciac.org/ciac/bulletins/k-030.shtml http://www.osvdb.org/1267 http://www.securityfocus.com/bid/1079 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003290852.aa27218%40blaze.arl.mil https://exchange.xforce.ibmcloud.com/vulnerabilities/4206 •
CVE-2000-1221 – RedHat 6.1 / IRIX 6.5.18 - 'lpd' Command Execution
https://notcve.org/view.php?id=CVE-2000-1221
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP. • https://www.exploit-db.com/exploits/19722 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://rhn.redhat.com/errata/RHSA-2000-002.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/30308 http://www.l0pht.com/advisories/lpd_advisory http://www.securityfocus.com/bid/927 https://exchange.xforce.ibmcloud.com/vulnerabilities/3840 •
CVE-2000-1220 – BSD / Linux - 'lpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1220
The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P http://seclists.org/lists/bugtraq/2000/Jan/0116.html http://www.atstake.com/research/advisories/2000/lpd_advisory.txt http://www.debian.org/security/2000/20000109 http://www.kb.cert.org/vuls/id/39001 http://www.l0pht.com/advisories/lpd_advisory http://www.redhat.com/support/errata/RHSA-2000-002.html http://www.securityfocus.com/bid/927 https://exchange. •
CVE-1999-0949 – Turbolinux 3.5 b2 - 'canuum' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0949
Buffer overflow in canuum program for Canna input system allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19583 http://www.securityfocus.com/bid/757 •