
CVE-1999-0974
https://notcve.org/view.php?id=CVE-1999-0974
09 Dec 1999 — Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/190 •

CVE-1999-0973 – Solaris 2.3/2.4/2.5/2.5.1/2.6/7.0 snoop - 'print_domain_name' Remote Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0973
07 Dec 1999 — Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode. • https://www.exploit-db.com/exploits/19663 •

CVE-1999-0859 – SunOS 4.1.4 - arp(8c) Memory Dump
https://notcve.org/view.php?id=CVE-1999-0859
01 Dec 1999 — Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly. • https://www.exploit-db.com/exploits/19232 •

CVE-1999-0860 – Solaris 7.0 - 'chkperm' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0860
01 Dec 1999 — Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack. • https://www.exploit-db.com/exploits/19235 •

CVE-1999-0908 – Solaris 7.0 - Recursive mutex_enter Remote Panic (Denial of Service)
https://notcve.org/view.php?id=CVE-1999-0908
23 Sep 1999 — Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter. • https://www.exploit-db.com/exploits/19507 •

CVE-1999-0691 – DIGITAL UNIX 4.0 d/e/f / AIX 4.3.2 / CDE 2.1 / IRIX 6.5.14 / Solaris 7.0 - Local Buffer Overflow
https://notcve.org/view.php?id=CVE-1999-0691
13 Sep 1999 — Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 •

CVE-1999-0687
https://notcve.org/view.php?id=CVE-1999-0687
13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVE-1999-0689 – Common Desktop Environment 2.1 20 / Solaris 7.0 - 'dtspcd' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0689
13 Sep 1999 — The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. • https://www.exploit-db.com/exploits/19498 •

CVE-1999-0674 – NetBSD 1.4 / OpenBSD 2.5 / Solaris 7.0 - 'profil' Modify The Internal Data Space
https://notcve.org/view.php?id=CVE-1999-0674
09 Aug 1999 — The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. • https://www.exploit-db.com/exploits/19447 •

CVE-1999-1371 – Solaris 2.6/2.7 - '/usr/bin/write' Local Overflow
https://notcve.org/view.php?id=CVE-1999-1371
08 Mar 1999 — Buffer overflow in /usr/bin/write in Solaris 2.6 and 7 allows local users to gain privileges via a long string in the terminal name argument. • https://www.exploit-db.com/exploits/256 •