Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1998-03-01 | CVE-1999-0795 | Unspecified vulnerability in SUN Solaris and Sunos The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches. | 7.5 |
1998-03-01 | CVE-1999-0514 | UDP messages to broadcast addresses are allowed, allowing for a Fraggle attack that can cause a denial of service by flooding the target. network low complexity | 5.0 |
1998-03-01 | CVE-1999-0502 | A Unix account has a default, null, blank, or missing password. | 7.5 |
1998-03-01 | CVE-1999-0330 | Unspecified vulnerability in Linux Kernel 2.6.20.1 Linux bdash game has a buffer overflow that allows local users to gain root access. | 7.2 |
1998-03-01 | CVE-1999-0320 | Unspecified vulnerability in SUN Solaris and Sunos SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files. | 9.3 |
1998-03-01 | CVE-1999-0266 | Unspecified vulnerability in Roar Smith Info2Www The info2www CGI script allows remote file access or remote command execution. | 7.5 |
1998-02-25 | CVE-1999-1486 | Unspecified vulnerability in IBM AIX sadc in IBM AIX 4.1 through 4.3, when called from programs such as timex that are setgid adm, allows local users to overwrite arbitrary files via a symlink attack. | 1.2 |
1998-02-25 | CVE-1999-1229 | Unspecified vulnerability in ID Software Quake 2 Server Quake 2 server 3.13 on Linux does not properly check file permissions for the config.cfg configuration file, which allows local users to read arbitrary files via a symlink from config.cfg to the target file. | 2.1 |
1998-02-21 | CVE-1999-0290 | Unspecified vulnerability in Qbik Wingate The WinGate telnet proxy allows remote attackers to cause a denial of service via a large number of connections to localhost. | 5.0 |
1998-02-20 | CVE-1999-1273 | Unspecified vulnerability in National Science Foundation Squid web Proxy 1.1.20 Squid Internet Object Cache 1.1.20 allows users to bypass access control lists (ACLs) by encoding the URL with hexadecimal escape sequences. | 7.5 |