Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
1999-06-23 CVE-1999-0731 Unspecified vulnerability in Caldera Openlinux 1.3/2.2
The KDE klock program allows local users to unlock a session using malformed input.
local
low complexity
caldera
4.6
1999-06-22 CVE-1999-0742 Unspecified vulnerability in Debian Linux 2.1
The Debian mailman package uses weak authentication, which allows attackers to gain privileges.
network
low complexity
debian
5.0
1999-06-16 CVE-1999-0929 Unspecified vulnerability in Novell Http Server and Netware
Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests.
network
low complexity
novell
5.0
1999-06-12 CVE-1999-0730 Unspecified vulnerability in Debian Linux 4.0
The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack.
network
low complexity
debian
critical
10.0
1999-06-11 CVE-1999-0713 The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.
local
low complexity
cde mit transarc digital
7.2
1999-06-10 CVE-1999-1023 Unspecified vulnerability in SUN Sunos 5.7
useradd in Solaris 7.0 does not properly interpret certain date formats as specified in the "-e" (expiration date) argument, which could allow users to login after their accounts have expired.
local
low complexity
sun
4.6
1999-06-10 CVE-1999-0775 Unspecified vulnerability in Cisco IOS 11.2(14)Gs2/11.2(15)G
Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list.
network
low complexity
cisco
critical
10.0
1999-06-09 CVE-2000-0118 The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.
local
low complexity
redhat sun
7.2
1999-06-09 CVE-1999-1231 Unspecified vulnerability in SSH Ssh2
ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server.
network
low complexity
ssh
5.0
1999-06-08 CVE-1999-1496 Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist.
local
low complexity
todd-miller debian redhat
2.1