Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-09-16 | CVE-1999-0704 | Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. | 9.3 |
1999-09-15 | CVE-1999-0817 | Unspecified vulnerability in University of Kansas Lynx Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. | 10.0 |
1999-09-13 | CVE-1999-1053 | Remote Command Execution vulnerability in Guestbook CGI guestbook.pl cleanses user-inserted SSI commands by removing text between "<!--" and "-->" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides "-->". | 7.5 |
1999-09-13 | CVE-1999-1014 | Unspecified vulnerability in SUN Solaris and Sunos Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument. | 4.6 |
1999-09-13 | CVE-1999-0759 | Unspecified vulnerability in Fuseware Fusemail 2.7 Buffer overflow in FuseMAIL POP service via long USER and PASS commands. | 10.0 |
1999-09-13 | CVE-1999-0751 | Buffer Overflow vulnerability in Netscape Enterprise Accept Buffer overflow in Accept command in Netscape Enterprise Server 3.6 with the SSL Handshake Patch. | 5.0 |
1999-09-13 | CVE-1999-0750 | Unspecified vulnerability in Microsoft Hotmail Hotmail allows Javascript to be executed via the HTML STYLE tag, allowing remote attackers to execute commands on the user's Hotmail account. | 5.1 |
1999-09-13 | CVE-1999-0691 | Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. | 7.2 |
1999-09-13 | CVE-1999-0689 | The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. | 7.2 |
1999-09-13 | CVE-1999-0687 | The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. | 7.5 |