CVE-1999-0692
https://notcve.org/view.php?id=CVE-1999-0692
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges. • ftp://patches.sgi.com/support/free/security/advisories/19990701-01-P http://www.ciac.org/ciac/bulletins/j-052.shtml •
CVE-1999-1485 – SGI IRIX 6.5.2 - 'nsd' Information Gathering
https://notcve.org/view.php?id=CVE-1999-1485
nsd in IRIX 6.5 through 6.5.2 exports a virtual filesystem on a UDP port, which allows remote attackers to view files and cause a possible denial of service by mounting the nsd virtual file system. • https://www.exploit-db.com/exploits/19316 http://marc.info/?l=bugtraq&m=92818552106912&w=2 http://www.osvdb.org/8564 http://www.securityfocus.com/bid/412 https://exchange.xforce.ibmcloud.com/vulnerabilities/2246 https://exchange.xforce.ibmcloud.com/vulnerabilities/2247 •
CVE-1999-1409 – NetBSD 1.3.2 / SGI IRIX 6.5.1 - 'at' Read File
https://notcve.org/view.php?id=CVE-1999-1409
The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. • https://www.exploit-db.com/exploits/19261 ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA1998-004.txt.asc http://marc.info/?l=bugtraq&m=90233906612929&w=2 http://www.iss.net/security_center/static/7577.php http://www.securityfocus.com/bid/331 http://www.shmoo.com/mail/bugtraq/jul98/msg00064.html •
CVE-1999-1461 – SGI IRIX 6.4 - 'inpview' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1461
inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program. • https://www.exploit-db.com/exploits/19304 ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I http://marc.info/?l=bugtraq&m=87602167420921&w=2 http://www.securityfocus.com/bid/381 •