
CVE-2001-0331
https://notcve.org/view.php?id=CVE-2001-0331
27 Jun 2001 — Buffer overflow in Embedded Support Partner (ESP) daemon (rpc.espd) in IRIX 6.5.8 and earlier allows remote attackers to execute arbitrary commands. • ftp://patches.sgi.com/support/free/security/advisories/20010501-01-P •

CVE-2000-0844 – Immunix OS 6.2 - LC glibc format string
https://notcve.org/view.php?id=CVE-2000-0844
14 Nov 2000 — Some functions that implement the locale subsystem on Unix do not properly cleanse user-injected format strings, which allows local attackers to execute arbitrary commands via functions such as gettext and catopen. • https://www.exploit-db.com/exploits/20187 • CWE-264: Permissions, Privileges, and Access Controls •

CVE-2000-1220 – BSD / Linux - 'lpr' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2000-1220
08 Jan 2000 — The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file. • https://www.exploit-db.com/exploits/325 •

CVE-1999-1102
https://notcve.org/view.php?id=CVE-1999-1102
31 Dec 1999 — lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times. • http://ciac.llnl.gov/ciac/bulletins/e-25.shtml •

CVE-1999-0215 – SGI IRIX 3/4/5/6 / OpenLinux 1.0/1.1 - routed traceon
https://notcve.org/view.php?id=CVE-1999-0215
26 Oct 1998 — Routed allows attackers to append data to files. • https://www.exploit-db.com/exploits/20805 •

CVE-1999-1181
https://notcve.org/view.php?id=CVE-1999-1181
29 Sep 1998 — Vulnerability in On-Line Customer Registration software for IRIX 6.2 through 6.4 allows local users to gain root privileges. • ftp://patches.sgi.com/support/free/security/advisories/19980901-01-PX •

CVE-1999-0329
https://notcve.org/view.php?id=CVE-1999-0329
01 Jun 1998 — SGI mediad program allows local users to gain root access. • ftp://patches.sgi.com/support/free/security/advisories/19980602-01-PX •

CVE-1999-1114 – SGI IRIX 6.4 - 'suid_exec' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1114
08 Apr 1998 — Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges. • https://www.exploit-db.com/exploits/19353 •

CVE-1999-0009 – ISC BIND (Linux/BSD) - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0009
08 Apr 1998 — Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 •

CVE-1999-0003 – Xi Graphics Maximum CDE 1.2.3/TriTeal TED CDE 4.3/Sun Solaris 2.5.1 - ToolTalk RPC Service Overflow
https://notcve.org/view.php?id=CVE-1999-0003
01 Apr 1998 — Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). • https://www.exploit-db.com/exploits/19102 •