CVE-2000-0666 – Conectiva 4.x/5.x / Debian 2.x / RedHat 6.x / S.u.S.E 6.x/7.0 / Trustix 1.x - rpc.statd Remote Format String
https://notcve.org/view.php?id=CVE-2000-0666
rpc.statd in the nfs-utils package in various Linux distributions does not properly cleanse untrusted format strings, which allows remote attackers to gain root privileges. • https://www.exploit-db.com/exploits/20075 https://www.exploit-db.com/exploits/20076 https://www.exploit-db.com/exploits/20077 http://archives.neohapsis.com/archives/bugtraq/2000-07/0206.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0230.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0236.html http://archives.neohapsis.com/archives/bugtraq/2000-07/0260.html http://www.calderasystems.com/support/security/advisories/CSSA-2000-025.0.txt http://www.cert. •
CVE-2000-0145
https://notcve.org/view.php?id=CVE-2000-0145
The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0145 •
CVE-1999-1330
https://notcve.org/view.php?id=CVE-1999-1330
The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf. • http://lists.openresources.com/Debian/debian-bugs-closed/msg00581.html http://marc.info/?l=bugtraq&m=87602661419259&w=2 http://www.iss.net/security_center/static/7244.php http://www.redhat.com/support/errata/rh42-errata-general.html#db •
CVE-1999-0872
https://notcve.org/view.php?id=CVE-1999-0872
Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file. • http://www.securityfocus.com/bid/611 http://www.securityfocus.com/bid/759 •
CVE-1999-0769 – Caldera OpenLinux 2.2 / Debian 2.1/2.2 / RedHat 6.0 - Vixie Cron MAILTO Sendmail
https://notcve.org/view.php?id=CVE-1999-0769
Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable. • https://www.exploit-db.com/exploits/19474 http://www.securityfocus.com/bid/611 •