Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
1998-07-03 CVE-1999-1409 The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.
local
low complexity
sgi netbsd
2.1
1998-07-03 CVE-1999-1202 Unspecified vulnerability in Startech Pop3 Proxy Server and Telnet Server
StarTech (1) POP3 proxy server and (2) telnet server allows remote attackers to cause a denial of service via a long USER command.
network
low complexity
startech
5.0
1998-07-01 CVE-1999-0494 Unspecified vulnerability in Wingate
Denial of service in WinGate proxy through a buffer overflow in POP3.
network
low complexity
wingate
5.0
1998-07-01 CVE-1999-0314 Unspecified vulnerability in SGI Irix 6.4
ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.
local
low complexity
sgi
7.2
1998-07-01 CVE-1999-0313 Unspecified vulnerability in SGI Irix 6.4
disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.
local
low complexity
sgi
7.2
1998-06-30 CVE-1999-1441 Unspecified vulnerability in Linux Kernel 2.0.34
Linux 2.0.34 does not properly prevent users from sending SIGIO signals to arbitrary processes, which allows local users to cause a denial of service by sending SIGIO to processes that do not catch it.
local
low complexity
linux
2.1
1998-06-30 CVE-1999-1150 Unspecified vulnerability in Livingston Portmaster Initial
Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions.
network
low complexity
livingston-portmaster
7.5
1998-06-29 CVE-1999-1556 Unspecified vulnerability in Microsoft SQL Server 6.5
Microsoft SQL Server 6.5 uses weak encryption for the password for the SQLExecutiveCmdExec account and stores it in an accessible portion of the registry, which could allow local users to gain privileges by reading and decrypting the CmdExecAccount value.
local
low complexity
microsoft
7.2
1998-06-29 CVE-1999-0797 Unspecified vulnerability in SUN Sunos
NIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries.
network
high complexity
sun
2.6
1998-06-26 CVE-1999-1038 Unspecified vulnerability in Tamu Tiger 2.2.3
Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable.
local
low complexity
tamu
7.2