Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1998-07-03 | CVE-1999-1409 | The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. | 2.1 |
1998-07-03 | CVE-1999-1202 | Unspecified vulnerability in Startech Pop3 Proxy Server and Telnet Server StarTech (1) POP3 proxy server and (2) telnet server allows remote attackers to cause a denial of service via a long USER command. | 5.0 |
1998-07-01 | CVE-1999-0494 | Unspecified vulnerability in Wingate Denial of service in WinGate proxy through a buffer overflow in POP3. | 5.0 |
1998-07-01 | CVE-1999-0314 | Unspecified vulnerability in SGI Irix 6.4 ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | 7.2 |
1998-07-01 | CVE-1999-0313 | Unspecified vulnerability in SGI Irix 6.4 disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | 7.2 |
1998-06-30 | CVE-1999-1441 | Unspecified vulnerability in Linux Kernel 2.0.34 Linux 2.0.34 does not properly prevent users from sending SIGIO signals to arbitrary processes, which allows local users to cause a denial of service by sending SIGIO to processes that do not catch it. | 2.1 |
1998-06-30 | CVE-1999-1150 | Unspecified vulnerability in Livingston Portmaster Initial Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions. | 7.5 |
1998-06-29 | CVE-1999-1556 | Unspecified vulnerability in Microsoft SQL Server 6.5 Microsoft SQL Server 6.5 uses weak encryption for the password for the SQLExecutiveCmdExec account and stores it in an accessible portion of the registry, which could allow local users to gain privileges by reading and decrypting the CmdExecAccount value. | 7.2 |
1998-06-29 | CVE-1999-0797 | Unspecified vulnerability in SUN Sunos NIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries. | 2.6 |
1998-06-26 | CVE-1999-1038 | Unspecified vulnerability in Tamu Tiger 2.2.3 Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable. | 7.2 |