CVE-1999-1297
https://notcve.org/view.php?id=CVE-1999-1297
cmdtool in OpenWindows 3.0 and XView 3.0 in SunOS 4.1.4 and earlier allows attackers with physical access to the system to display unechoed characters (such as those from password prompts) via the L2/AGAIN key. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100452&zone_32=10045%2A%20 https://exchange.xforce.ibmcloud.com/vulnerabilities/7482 •
CVE-1999-0009 – ISC BIND (Linux/BSD) - Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. • https://www.exploit-db.com/exploits/19111 https://www.exploit-db.com/exploits/19112 ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180 http://www.securityfocus.com/bid/134 http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083 •
CVE-1999-0003 – Xi Graphics Maximum CDE 1.2.3/TriTeal TED CDE 4.3/Sun Solaris 2.5.1 - ToolTalk RPC Service Overflow
https://notcve.org/view.php?id=CVE-1999-0003
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). • https://www.exploit-db.com/exploits/19102 https://www.exploit-db.com/exploits/19101 ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX http://www.securityfocus.com/bid/122 •
CVE-1999-0097
https://notcve.org/view.php?id=CVE-1999-0097
The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character). • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0097 •
CVE-1999-1192
https://notcve.org/view.php?id=CVE-1999-1192
Buffer overflow in eeprom in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/143 http://www.iss.net/security_center/static/7444.php http://www.securityfocus.com/bid/206 •