CVE-2001-0691
https://notcve.org/view.php?id=CVE-2001-0691
Buffer overflows in Washington University imapd 2000a through 2000c could allow local users without shell access to execute code as themselves in certain configurations. • http://www.iss.net/security_center/static/6269.php http://www.redhat.com/support/errata/RHSA-2001-094.html http://www.securityfocus.com/advisories/3352 http://www.securityfocus.com/bid/2856 •
CVE-2000-0909 – UoW Pine 4.0.4/4.10/4.21 - 'From:' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-2000-0909
Buffer overflow in the automatic mail checking component of Pine 4.21 and earlier allows remote attackers to execute arbitrary commands via a long From: header. • https://www.exploit-db.com/exploits/20237 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:59.pine.asc http://archives.neohapsis.com/archives/bugtraq/2000-10/0441.html http://www.linux-mandrake.com/en/security/MDKSA-2000-073.php3 http://www.redhat.com/support/errata/RHSA-2000-102.html http://www.securityfocus.com/archive/1/84901 http://www.securityfocus.com/bid/1709 https://exchange.xforce.ibmcloud.com/vulnerabilities/5283 •
CVE-2000-0847
https://notcve.org/view.php?id=CVE-2000-0847
Buffer overflow in University of Washington c-client library (used by pine and other programs) allows remote attackers to execute arbitrary commands via a long X-Keywords header. • http://archives.neohapsis.com/archives/bugtraq/2000-08/0425.html http://archives.neohapsis.com/archives/bugtraq/2000-08/0437.html http://archives.neohapsis.com/archives/freebsd/2000-09/0108.html http://www.securityfocus.com/bid/1646 http://www.securityfocus.com/bid/1687 https://exchange.xforce.ibmcloud.com/vulnerabilities/5223 •
CVE-2000-0284 – IMAP4rev1 10.190 - Authentication Stack Overflow
https://notcve.org/view.php?id=CVE-2000-0284
Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands. • https://www.exploit-db.com/exploits/253 https://www.exploit-db.com/exploits/284 https://www.exploit-db.com/exploits/10025 https://www.exploit-db.com/exploits/16846 https://www.exploit-db.com/exploits/397 https://www.exploit-db.com/exploits/19847 https://www.exploit-db.com/exploits/19848 https://www.exploit-db.com/exploits/19849 http://archives.neohapsis.com/archives/bugtraq/2000-04/0074.html http://archives.neohapsis.com/archives/bugtraq/2000-04/0085.html http: •
CVE-1999-0997 – WU-FTPD 2.4.2/2.5 .0/2.6.0/2.6.1/2.6.2 - FTP Conversion
https://notcve.org/view.php?id=CVE-1999-0997
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress. • https://www.exploit-db.com/exploits/20563 http://www.debian.org/security/2003/dsa-377 •