CVE-1999-0997 – WU-FTPD 2.4.2/2.5 .0/2.6.0/2.6.1/2.6.2 - FTP Conversion
https://notcve.org/view.php?id=CVE-1999-0997
wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress. • https://www.exploit-db.com/exploits/20563 http://www.debian.org/security/2003/dsa-377 •
CVE-2000-0352
https://notcve.org/view.php?id=CVE-2000-0352
Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL. • ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-036.0.txt http://www.novell.com/linux/security/advisories/suse_security_announce_36.html http://www.securityfocus.com/bid/810 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9911171818220.12375-100000%40ray.compu-aid.com •
CVE-1999-0878
https://notcve.org/view.php?id=CVE-1999-0878
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR. • http://www.securityfocus.com/bid/599 •
CVE-2000-0353
https://notcve.org/view.php?id=CVE-2000-0353
Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine. • http://www.novell.com/linux/security/advisories/pine_update_announcement.html http://www.novell.com/linux/security/advisories/suse_security_announce_6.html http://www.securiteam.com/unixfocus/HHP-Pine_remote_exploit.html http://www.securityfocus.com/bid/1247 •
CVE-1999-0920 – University of Washington pop2d 4.4 - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0920
Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command. • https://www.exploit-db.com/exploits/19226 http://www.securityfocus.com/bid/283 •