
CVE-1999-0305
https://notcve.org/view.php?id=CVE-1999-0305
01 Feb 1998 — The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections. • http://www.openbsd.org/advisories/sourceroute.txt •

CVE-1999-0513 – Linux Kernel 2.0/2.1 (Digital UNIX 4.0 D / FreeBSD 2.2.4 / HP HP-UX 10.20/11.0 / IBM AIX 3.2.5 / NetBSD 1.2 / Solaris 2.5.1) - Smurf Denial of Service
https://notcve.org/view.php?id=CVE-1999-0513
05 Jan 1998 — ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service. • https://www.exploit-db.com/exploits/19117 •

CVE-1999-0017
https://notcve.org/view.php?id=CVE-1999-0017
10 Dec 1997 — FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017 •

CVE-1999-0322
https://notcve.org/view.php?id=CVE-1999-0322
29 Oct 1997 — The open() function in FreeBSD allows local attackers to write to arbitrary files. • http://www.osvdb.org/6092 •

CVE-1999-0061
https://notcve.org/view.php?id=CVE-1999-0061
02 Oct 1997 — File creation and deletion, and remote execution, in the BSD line printer daemon (lpd). • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0061 •

CVE-1999-1214
https://notcve.org/view.php?id=CVE-1999-1214
15 Sep 1997 — The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID. • http://www.openbsd.com/advisories/signals.txt • CWE-255: Credentials Management Errors •

CVE-1999-0628
https://notcve.org/view.php?id=CVE-1999-0628
01 Jul 1997 — The rwho/rwhod service is running, which exposes machine status and user information. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628 •

CVE-1999-0074
https://notcve.org/view.php?id=CVE-1999-0074
01 Jul 1997 — Listening TCP ports are sequentially allocated, allowing spoofing attacks. • https://www.cve.org/CVERecord?id=CVE-1999-0074 •

CVE-1999-0037
https://notcve.org/view.php?id=CVE-1999-0037
21 May 1997 — Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0037 •

CVE-1999-1402 – FreeBSD 3.1 / Solaris 2.6 - Domain Socket
https://notcve.org/view.php?id=CVE-1999-1402
17 May 1997 — The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket. • https://www.exploit-db.com/exploits/19346 •