CVE-1999-1299
https://notcve.org/view.php?id=CVE-1999-1299
03 Feb 1997 — rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file. • http://marc.info/?l=bugtraq&m=87602167420509&w=2 •
CVE-1999-0043
https://notcve.org/view.php?id=CVE-1999-0043
04 Dec 1996 — Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-1999-0130 – BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon
https://notcve.org/view.php?id=CVE-1999-0130
16 Nov 1996 — Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 •
CVE-1999-0234
https://notcve.org/view.php?id=CVE-1999-0234
08 Oct 1996 — Bash treats any character with a value of 255 as a command separator. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0234 •
CVE-1999-0131
https://notcve.org/view.php?id=CVE-1999-0131
11 Sep 1996 — Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •
CVE-1999-1491 – RedHat Linux 2.1 - 'abuse.console' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1491
02 Feb 1996 — abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. • https://www.exploit-db.com/exploits/19279 •
CVE-1999-1186
https://notcve.org/view.php?id=CVE-1999-1186
02 Jan 1996 — rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. • http://marc.info/?l=bugtraq&m=87602167418966&w=2 •
CVE-2000-0508 – Debian 2.1/2.2 / Mandrake 6.0/6.1/7.0 / RedHat 6.x - 'rpc.lockd' Remote Denial of Service
https://notcve.org/view.php?id=CVE-2000-0508
19 Dec 1994 — rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request. • https://www.exploit-db.com/exploits/20025 •