
CVE-2003-0552
https://notcve.org/view.php?id=CVE-2003-0552
25 Jul 2003 — Linux 2.4.x allows remote attackers to spoof the bridge Forwarding table via forged packets whose source addresses are the same as the target. Linux 2.4.x pemite a atacantes remotos suplantar entradas en la tabla de reenvio de puente (bridge forwarding) mediante paquetes falsificados cuya dirección de origen es la misma que la del objetivo. • http://www.debian.org/security/2004/dsa-358 •

CVE-2002-1337 – Sendmail 8.11.x (Linux/i386) - Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2002-1337
07 Mar 2003 — Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. Desbordamiento de búfer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecución arbitraria de código mediante ciertos campos de dirección formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la función crackaddr del fichero heade... • https://www.exploit-db.com/exploits/411 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2000-0314
https://notcve.org/view.php?id=CVE-2000-0314
12 Mar 2001 — traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc •

CVE-2000-0315
https://notcve.org/view.php?id=CVE-2000-0315
12 Mar 2001 — traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks. • ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-004.txt.asc •

CVE-2000-0193 – Corel Linux OS 1.0 - Dosemu Distribution Configuration
https://notcve.org/view.php?id=CVE-2000-0193
02 Mar 2000 — The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges. • https://www.exploit-db.com/exploits/19787 •

CVE-2000-0194 – Corel Linux OS 1.0 - buildxconfig
https://notcve.org/view.php?id=CVE-2000-0194
24 Feb 2000 — buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters. • https://www.exploit-db.com/exploits/19764 •

CVE-2000-0195 – Corel Linux OS 1.0 - 'setxconf' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-0195
24 Feb 2000 — setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file. • https://www.exploit-db.com/exploits/19765 •

CVE-2000-0048 – Corel Linux OS 1.0 - get_it PATH
https://notcve.org/view.php?id=CVE-2000-0048
12 Jan 2000 — get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program. • https://www.exploit-db.com/exploits/19723 •

CVE-2000-0118 – RedHat Linux 5.2 i386/6.0 - No Logging
https://notcve.org/view.php?id=CVE-2000-0118
09 Jun 1999 — The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 •

CVE-1999-0002 – RedHat Linux 5.1 / Caldera OpenLinux Standard 1.2 - Mountd
https://notcve.org/view.php?id=CVE-1999-0002
12 Oct 1998 — Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems. • https://www.exploit-db.com/exploits/19096 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •