
CVE-1999-0208 – HP-UX 10/11/ IRIX 3/4/5/6 / OpenSolaris build snv / Solaris 8/9/10 / SunOS 4.1 - 'rpc.ypupdated' Command Execution
https://notcve.org/view.php?id=CVE-1999-0208
12 Dec 1995 — rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. • https://www.exploit-db.com/exploits/20258 •

CVE-1999-0073
https://notcve.org/view.php?id=CVE-1999-0073
13 Oct 1995 — Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0073 •

CVE-1999-1243 – IRIX 5.2/6.0 - Permissions File Manipulation
https://notcve.org/view.php?id=CVE-1999-1243
03 Mar 1995 — SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges. • https://www.exploit-db.com/exploits/20263 •

CVE-1999-1022 – SGI IRIX 5.2/5.3 - 'serial_ports' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1022
02 Oct 1994 — serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. • https://www.exploit-db.com/exploits/19351 •

CVE-1999-1219 – SGI IRIX 5.1/5.2 - 'sgihelp' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-1219
11 Aug 1994 — Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command. • https://www.exploit-db.com/exploits/19354 •

CVE-1999-1494 – SGI IRIX 6.0.1 - 'colorview' Read Files
https://notcve.org/view.php?id=CVE-1999-1494
09 Aug 1994 — colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument. • https://www.exploit-db.com/exploits/19269 •

CVE-1999-1468
https://notcve.org/view.php?id=CVE-1999-1468
22 Oct 1991 — rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. • http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html •

CVE-1999-1554
https://notcve.org/view.php?id=CVE-1999-1554
31 Oct 1990 — /usr/sbin/Mail on SGI IRIX 3.3 and 3.3.1 does not properly set the group ID to the group ID of the user who started Mail, which allows local users to read the mail of other users. • http://www.cert.org/advisories/CA-1990-08.html •