CVE-1999-0096
https://notcve.org/view.php?id=CVE-1999-0096
Sendmail decode alias can be used to overwrite sensitive files. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba •
CVE-1999-0129
https://notcve.org/view.php?id=CVE-1999-0129
Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. • http://www.cert.org/advisories/CA-1996-25.html •
CVE-1999-0130 – BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon
https://notcve.org/view.php?id=CVE-1999-0130
Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 http://www.securityfocus.com/bid/716 •
CVE-1999-0023 – BSDI BSD/OS 2.1 / FreeBSD 2.1 / IBM AIX 4.2 / SGI IRIX 6.4 / Sun SunOS 4.1.3 - Buffer Overrun
https://notcve.org/view.php?id=CVE-1999-0023
Local user gains root privileges via buffer overflow in rdist, via lookup() function. • https://www.exploit-db.com/exploits/19106 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023 •
CVE-1999-1313
https://notcve.org/view.php?id=CVE-1999-1313
Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands. • ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc http://ciac.llnl.gov/ciac/bulletins/g-24.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/7348 •