CVE-2000-0322 – RedHat Piranha Virtual Server Package - 'passwd.php3' Arbitrary Command Execution
https://notcve.org/view.php?id=CVE-2000-0322
The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters. • https://www.exploit-db.com/exploits/16858 http://www.redhat.com/support/errata/RHSA-2000-014.html http://www.securityfocus.com/bid/1149 http://www.securityfocus.com/templates/archive.pike?list=1&msg=Enip.BSO.23.0004241601140.28851-100000%40www.whitehats.com •
CVE-2000-0336 – OpenLDAP 1.2.7/1.2.8/1.2.9/1.2.10 - '/usr/tmp/' Symlink
https://notcve.org/view.php?id=CVE-2000-0336
Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack. • https://www.exploit-db.com/exploits/19946 ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt http://www.redhat.com/support/errata/RHSA-2000-012.html http://www.securityfocus.com/bid/1232 http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html •
CVE-2000-0286 – RedHat Linux 6.x - X Font Server Buffer Overflow (Denial of Service)
https://notcve.org/view.php?id=CVE-2000-0286
X fontserver xfs allows local users to cause a denial of service via malformed input to the server. • https://www.exploit-db.com/exploits/19850 http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html http://www.securityfocus.com/bid/1111 •
CVE-2000-0263 – RedHat Linux 6.x - X Font Server Buffer Overflow (Denial of Service)
https://notcve.org/view.php?id=CVE-2000-0263
The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request. • https://www.exploit-db.com/exploits/19850 http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html http://www.securityfocus.com/bid/1111 •
CVE-2000-0289
https://notcve.org/view.php?id=CVE-2000-0289
IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0284.html http://www.novell.com/linux/security/advisories/suse_security_announce_48.html http://www.securityfocus.com/bid/1078 •