CVE-1999-1143
https://notcve.org/view.php?id=CVE-1999-1143
Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs. • ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX http://ciac.llnl.gov/ciac/bulletins/h-65.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2109 •
CVE-1999-0036 – SGI IRIX - '/bin/login' Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0036
IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files. • https://www.exploit-db.com/exploits/336 https://www.exploit-db.com/exploits/19310 ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX http://www.ciac.org/ciac/bulletins/h-106.shtml http://www.osvdb.org/990 https://exchange.xforce.ibmcloud.com/vulnerabilities/557 • CWE-434: Unrestricted Upload of File with Dangerous Type •
CVE-1999-1232
https://notcve.org/view.php?id=CVE-1999-1232
Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program. • http://marc.info/?l=bugtraq&m=87602167420994&w=2 http://www.osvdb.org/8559 https://exchange.xforce.ibmcloud.com/vulnerabilities/3316 •
CVE-1999-1410 – SGI IRIX 6.2 - '/usr/lib/netaddpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1410
addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.securityfocus.com/bid/330 •
CVE-1999-1286 – SGI IRIX 6.2 - '/usr/lib/netaddpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1286
addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file. • https://www.exploit-db.com/exploits/19260 ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX http://marc.info/?l=bugtraq&m=87602167420927&w=2 http://www.osvdb.org/8560 http://www.securityfocus.com/bid/330 https://exchange.xforce.ibmcloud.com/vulnerabilities/1433 •