Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-02-25 | CVE-1999-0483 | Denial-Of-Service vulnerability in OpenBSD OpenBSD crash using nlink value in FFS and EXT2FS filesystems. | 2.1 |
1999-02-25 | CVE-1999-0408 | Unspecified vulnerability in SUN Cobalt RAQ Files created from interactive shell sessions in Cobalt RaQ microservers (e.g. | 10.0 |
1999-02-25 | CVE-1999-0380 | Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421 SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user. | 4.6 |
1999-02-24 | CVE-1999-1247 | Unspecified vulnerability in HP Hp-Ux 9 Vulnerability in HP Camera component of HP DCE/9000 in HP-UX 9.x allows attackers to gain root privileges. | 7.2 |
1999-02-23 | CVE-1999-0484 | Unspecified vulnerability in Openbsd Buffer overflow in OpenBSD ping. | 2.1 |
1999-02-22 | CVE-1999-0441 | Unspecified vulnerability in Qbik Wingate 3.0 Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service. | 5.0 |
1999-02-22 | CVE-1999-0379 | Unspecified vulnerability in Microsoft Backoffice Resource KIT 2.0 Microsoft Taskpads allows remote web sites to execute commands on the visiting user's machine via certain methods that are marked as Safe for Scripting. | 7.5 |
1999-02-22 | CVE-1999-0378 | Remote Security vulnerability in Interscan Viruswall (HP-UX) InterScan VirusWall for Solaris doesn't scan files for viruses when a single HTTP request includes two GET commands. | 5.0 |
1999-02-22 | CVE-1999-0377 | Denial-Of-Service vulnerability in Unix Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine's process tables through multiple connections to network services. | 5.0 |
1999-02-21 | CVE-1999-1049 | Unspecified vulnerability in Broadcom Arcserve Backup 6.5 ARCserve NT agents use weak encryption (XOR) for passwords, which allows remote attackers to sniff the authentication request to port 6050 and decrypt the password. | 10.0 |