
CVE-1999-0908 – Solaris 7.0 - Recursive mutex_enter Remote Panic (Denial of Service)
https://notcve.org/view.php?id=CVE-1999-0908
23 Sep 1999 — Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter. • https://www.exploit-db.com/exploits/19507 •

CVE-1999-0786 – Solaris 2.6 - Profiling File Creation
https://notcve.org/view.php?id=CVE-1999-0786
22 Sep 1999 — The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack. • https://www.exploit-db.com/exploits/19509 •

CVE-1999-0691 – DIGITAL UNIX 4.0 d/e/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0691
13 Sep 1999 — Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 •

CVE-1999-0687
https://notcve.org/view.php?id=CVE-1999-0687
13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVE-1999-0689 – Common Desktop Environment 2.1 20 / Solaris 7.0 - 'dtspcd' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0689
13 Sep 1999 — The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. • https://www.exploit-db.com/exploits/19498 •

CVE-1999-0767 – IBM AIX 4.2.1 / Sun Solaris 7.0 - LC_MESSAGES libc Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0767
08 Sep 1999 — Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable. • https://www.exploit-db.com/exploits/19216 •

CVE-1999-0674 – NetBSD 1.4 / OpenBSD 2.5 / Solaris 7.0 - 'profil' Modify The Internal Data Space
https://notcve.org/view.php?id=CVE-1999-0674
09 Aug 1999 — The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 •

CVE-1999-0696 – Caldera OpenUnix 8.0/UnixWare 7.1.1 / HP HP-UX 11.0 / Solaris 7.0 / SunOS 4.1.4 - rpc.cmsd Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0696
01 Jul 1999 — Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). • https://www.exploit-db.com/exploits/19420 •

CVE-2000-0118 – RedHat Linux 5.2 i386/6.0 - No Logging
https://notcve.org/view.php?id=CVE-2000-0118
09 Jun 1999 — The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing. • https://www.exploit-db.com/exploits/19255 •

CVE-1999-0493 – Sun Solaris 2.5.1 - rpc.statd rpc Call Relaying
https://notcve.org/view.php?id=CVE-1999-0493
07 Jun 1999 — rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd. • https://www.exploit-db.com/exploits/19327 •