Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
1994-11-30 CVE-1999-1303 Unspecified vulnerability in SCO products
Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access.
local
low complexity
sco
7.2
1994-11-30 CVE-1999-1302 Unspecified vulnerability in SCO products
Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.
local
low complexity
sco
7.2
1994-11-30 CVE-1999-1248 Unspecified vulnerability in HP Hp-Ux
Vulnerability in Support Watch (aka SupportWatch) in HP-UX 8.0 through 9.0 allows local users to gain privileges.
local
low complexity
hp
4.6
1994-10-02 CVE-1999-1022 Unspecified vulnerability in SGI Irix 4/5.2/5.3
serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program.
local
high complexity
sgi
6.2
1994-09-21 CVE-1999-1238 Unspecified vulnerability in HP Hp-Ux
Vulnerability in CORE-DIAG fileset in HP message catalog in HP-UX 9.05 and earlier allows local users to gain privileges.
local
low complexity
hp
4.6
1994-08-11 CVE-1999-1219 Unspecified vulnerability in SGI Irix 5.1/5.2
Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command.
local
low complexity
sgi
7.2
1994-08-09 CVE-1999-1494 Unspecified vulnerability in SGI Irix
colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument.
local
low complexity
sgi
2.1
1994-07-20 CVE-1999-1552 Unspecified vulnerability in IBM AIX
dpsexec (DPS Server) when running under XDM in IBM AIX 3.2.5 and earlier does not properly check privileges, which allows local users to overwrite arbitrary files and gain privileges.
local
low complexity
ibm
7.2
1994-07-13 CVE-1999-1239 Unspecified vulnerability in HP Hp-Ux 9
HP-UX 9.x does not properly enable the Xauthority mechanism in certain conditions, which could allow local users to access the X display even when they have not explicitly been authorized to do so.
local
low complexity
hp
4.6
1994-06-09 CVE-1999-0207 Unspecified vulnerability in Great Circle Associates Majordomo 1.90/1.91
Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command.
network
low complexity
great-circle-associates
7.5