CVE-1999-0051 – SGI IRIX 5.3/6.2 / SGI license_oeo 1.0 LicenseManager - 'NETLS_LICENSE_FILE' Local Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0051
Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX. • https://www.exploit-db.com/exploits/19066 https://www.exploit-db.com/exploits/19067 https://www.exploit-db.com/exploits/19350 https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0051 •
CVE-1999-0032 – BSD/OS 2.1 / FreeBSD 2.1.5 / NeXTstep 4.x / IRIX 6.4 / SunOS 4.1.3/4.1.4 - '/usr/bin/lpr' Buffer Overrun Privilege Escalation
https://notcve.org/view.php?id=CVE-1999-0032
Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option. • https://www.exploit-db.com/exploits/19545 https://www.exploit-db.com/exploits/19544 ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX http://www.ciac.org/ciac/bulletins/i-042.shtml http://www.securityfocus.com/bid/707 •
CVE-1999-0143
https://notcve.org/view.php?id=CVE-1999-0143
Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0143 •
CVE-1999-1137
https://notcve.org/view.php?id=CVE-1999-1137
The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba http://www.ciac.org/ciac/bulletins/e-01.shtml http://www.osvdb.org/6436 https://exchange.xforce.ibmcloud.com/vulnerabilities/549 •
CVE-1999-1318
https://notcve.org/view.php?id=CVE-1999-1318
/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20 http://www.iss.net/security_center/static/7480.php •