CVE-2000-0031
https://notcve.org/view.php?id=CVE-2000-0031
The initscripts package in Red Hat Linux allows local users to gain privileges via a symlink attack. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0031 •
CVE-2000-0229 – gpm 1.18.1/1.19 / Debian 2.x / RedHat 6.x / S.u.S.E 5.3/6.x - gpm Setgid
https://notcve.org/view.php?id=CVE-2000-0229
gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root. • https://www.exploit-db.com/exploits/19816 http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html http://www.novell.com/linux/security/advisories/suse_security_announce_45.html http://www.redhat.com/support/errata/RHSA-2000-009.html http://www.redhat.com/support/errata/RHSA-2000-045.html http://www.securityfocus.com/bid/1069 •
CVE-2000-0230 – Halloween Linux 4.0 / RedHat Linux 6.1/6.2 - 'imwheel'
https://notcve.org/view.php?id=CVE-2000-0230
Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable. • https://www.exploit-db.com/exploits/19811 https://www.exploit-db.com/exploits/19812 http://archives.neohapsis.com/archives/bugtraq/2000-03/0168.html http://www.redhat.com/support/errata/RHSA-2000-016.html http://www.securityfocus.com/bid/1060 •
CVE-2000-0184
https://notcve.org/view.php?id=CVE-2000-0184
Linux printtool sets the permissions of printer configuration files to be world-readable, which allows local attackers to obtain printer share passwords. • http://archives.neohapsis.com/archives/bugtraq/2000-03/0082.html http://www.securityfocus.com/bid/1037 •
CVE-2000-0193 – Corel Linux OS 1.0 - Dosemu Distribution Configuration
https://notcve.org/view.php?id=CVE-2000-0193
The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges. • https://www.exploit-db.com/exploits/19787 http://www.securityfocus.com/bid/1030 http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168%40jawa.chilli.net.au •