CVE-1999-0009 – ISC BIND (Linux/BSD) - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •
CVE-1999-1501
https://notcve.org/view.php?id=CVE-1999-1501
(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands. • http://marc.info/?l=bugtraq&m=89217373930054&w=2 http://www.securityfocus.com/bid/70 http://www.securityfocus.com/bid/71 •
CVE-1999-1114 – SGI IRIX 6.4 - 'suid_exec' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1114
Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19353 ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.17.suid_exec.vul ftp://patches.sgi.com/support/free/security/advisories/19980405-01-I http://ciac.llnl.gov/ciac/bulletins/h-15a.shtml http://www.securityfocus.com/bid/467 https://exchange.xforce.ibmcloud.com/vulnerabilities/2100 •
CVE-1999-0270
https://notcve.org/view.php?id=CVE-1999-0270
Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as "pfdisplay") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files. • ftp://patches.sgi.com/support/free/security/advisories/19980401-01-P http://www.ciac.org/ciac/bulletins/i-041.shtml http://www.osvdb.org/134 http://www.securityfocus.com/bid/64 https://exchange.xforce.ibmcloud.com/vulnerabilities/810 •
CVE-1999-1183
https://notcve.org/view.php?id=CVE-1999-1183
System Manager sysmgr GUI in SGI IRIX 6.4 and 6.3 allows remote attackers to execute commands by providing a trojan horse (1) runtask or (2) runexec descriptor file, which is used to execute a System Manager Task when the user's Mailcap entry supports the x-sgi-task or x-sgi-exec type. • ftp://patches.sgi.com/support/free/security/advisories/19980403-01-PX ftp://patches.sgi.com/support/free/security/advisories/19980403-02-PX http://www.iss.net/security_center/static/809.php http://www.osvdb.org/8556 •