CVE-1999-0043
https://notcve.org/view.php?id=CVE-1999-0043
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •
CVE-1999-0130 – BSD 2 / CND 1 / Sendmail 8.x / FreeBSD 2.1.x / HP-UX 10.x / AIX 4 / RedHat 4 - Sendmail Daemon
https://notcve.org/view.php?id=CVE-1999-0130
Local users can start Sendmail in daemon mode and gain root privileges. • https://www.exploit-db.com/exploits/19556 http://www.securityfocus.com/bid/716 •
CVE-1999-0234
https://notcve.org/view.php?id=CVE-1999-0234
Bash treats any character with a value of 255 as a command separator. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0234 •
CVE-1999-0131
https://notcve.org/view.php?id=CVE-1999-0131
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •
CVE-1999-1491 – RedHat Linux 2.1 - 'abuse.console' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1491
abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. • https://www.exploit-db.com/exploits/19279 http://marc.info/?l=bugtraq&m=87602167418994&w=2 http://www.securityfocus.com/bid/354 •