CVE-1999-1319
https://notcve.org/view.php?id=CVE-1999-1319
Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations. • ftp://patches.sgi.com/support/free/security/advisories/19960101-01-PX http://www.iss.net/security_center/static/7430.php •
CVE-1999-0208 – HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution
https://notcve.org/view.php?id=CVE-1999-0208
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20258 https://www.exploit-db.com/exploits/20259 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0208 •
CVE-1999-0073
https://notcve.org/view.php?id=CVE-1999-0073
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0073 •
CVE-1999-1243 – IRIX 5.2/6.0 - Permissions File Manipulation
https://notcve.org/view.php?id=CVE-1999-1243
SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges. • https://www.exploit-db.com/exploits/20263 ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373 http://ciac.llnl.gov/ciac/bulletins/f-16.shtml https://exchange.xforce.ibmcloud.com/vulnerabilities/2113 •
CVE-1999-1022 – SGI IRIX 5.2/5.3 - 'serial_ports' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1022
serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. • https://www.exploit-db.com/exploits/19351 http://www.securityfocus.com/archive/1/930 http://www.securityfocus.com/bid/464 https://exchange.xforce.ibmcloud.com/vulnerabilities/2111 •