Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
1995-12-01 CVE-1999-0123 Unspecified vulnerability in Slackware Linux 3.0
Race condition in Linux mailx command allows local users to read user files.
local
high complexity
slackware
3.7
1995-11-30 CVE-1999-0080 Unspecified vulnerability in Washington University Wu-Ftpd 2.4
Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command.
network
low complexity
washington-university
critical
10.0
1995-11-01 CVE-1999-0241 Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g.
network
low complexity
sgi xfree86-project sun
critical
10.0
1995-10-19 CVE-1999-0099 Buffer overflow in syslog utility allows local or remote attackers to gain root privileges.
network
low complexity
sun cray convex bsdi ibm
critical
10.0
1995-10-13 CVE-1999-0073 Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access.
network
low complexity
sgi digital
critical
10.0
1995-10-01 CVE-1999-0218 Unspecified vulnerability in Livingston Portmaster
Livingston portmaster machines could be rebooted via a series of commands.
network
low complexity
livingston-portmaster
5.0
1995-09-07 CVE-1999-0245 Unspecified vulnerability in Linux Kernel 2.6.20.1
Some configurations of NIS+ in Linux allowed attackers to log in as the user "+".
local
low complexity
linux
4.6
1995-08-31 CVE-1999-0155 Unspecified vulnerability in Aladdin Enterprises Ghostscript 2.6/3.22
The ghostscript command with the -dSAFER option allows remote attackers to execute commands.
network
low complexity
aladdin-enterprises
7.5
1995-08-29 CVE-1999-0164 Unspecified vulnerability in SUN Sunos 5.3/5.4
A race condition in the Solaris ps command allows an attacker to overwrite critical files.
local
high complexity
sun
6.2
1995-08-23 CVE-1999-1580 SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.
local
low complexity
sendmail sun
7.2