Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
1998-05-28 CVE-1999-1490 Unspecified vulnerability in Redhat Linux 5.1
xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable.
local
low complexity
redhat
7.2
1998-05-27 CVE-1999-1492 Unspecified vulnerability in SGI Irix 6.4
Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges.
local
low complexity
sgi
7.2
1998-05-27 CVE-1999-1039 Unspecified vulnerability in SGI Irix 6.4
Vulnerability in (1) diskalign and (2) diskperf in IRIX 6.4 patches 2291 and 2848 allow a local user to create root-owned files leading to a root compromise.
local
low complexity
sgi
7.2
1998-05-21 CVE-1999-0303 Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.
local
low complexity
sun netbsd digital openbsd
4.6
1998-05-16 CVE-1999-1096 Unspecified vulnerability in KDE 1.0
Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable.
local
low complexity
kde
7.2
1998-05-15 CVE-1999-1179 Unspecified vulnerability in Sysadmin Magazine Man.Sh
Vulnerability in man.sh CGI script, included in May 1998 issue of SysAdmin Magazine, allows remote attackers to execute arbitrary commands.
network
low complexity
sysadmin-magazine
7.5
1998-05-14 CVE-1999-0055 Buffer overflows in Sun libnsl allow root access.
local
low complexity
ibm sun
7.2
1998-05-11 CVE-1999-1389 Unspecified vulnerability in 3Com Total Control Netserver Card 3.7.24
US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the "set host prompt" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the "host: " prompt.
network
low complexity
3com
7.5
1998-05-11 CVE-1999-1204 Unspecified vulnerability in Checkpoint Firewall-1
Check Point Firewall-1 does not properly handle certain restricted keywords (e.g., Mail, auth, time) in user-defined objects, which could produce a rule with a default "ANY" address and result in access to more systems than intended by the administrator.
network
low complexity
checkpoint
7.5
1998-05-10 CVE-1999-0919 Unspecified vulnerability in Motorola Cablerouter
A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections.
network
low complexity
motorola
critical
10.0