Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-08-16 | CVE-1999-0749 | Unspecified vulnerability in Microsoft Windows 95 and Windows 98 Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument. | 2.6 |
1999-08-16 | CVE-1999-0746 | A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service. | 5.0 |
1999-08-13 | CVE-1999-0679 | Unspecified vulnerability in Hybrid Network Hybrid Ircd 5.03P7 Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option. | 7.5 |
1999-08-12 | CVE-1999-1336 | Unspecified vulnerability in 3Com Hiperarc 4.2.29 3Com HiPer Access Router Card (HiperARC) 4.0 through 4.2.29 allows remote attackers to cause a denial of service (reboot) via a flood of IAC packets to the telnet port. | 5.0 |
1999-08-12 | CVE-1999-0724 | Unspecified vulnerability in Openbsd 2.5 Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function. | 4.6 |
1999-08-11 | CVE-1999-0814 | Unspecified vulnerability in Redhat Linux 6.0 Red Hat pump DHCP client allows remote attackers to gain root access in some configurations. | 10.0 |
1999-08-11 | CVE-1999-0694 | Unspecified vulnerability in IBM AIX 4.2/4.3 Denial of service in AIX ptrace system call allows local users to crash the system. | 2.1 |
1999-08-10 | CVE-1999-0813 | Unspecified vulnerability in Infodrom Cfingerd Cfingerd with ALLOW_EXECUTION enabled does not properly drop privileges when it executes a program on behalf of the user, allowing local users to gain root privileges. | 7.2 |
1999-08-09 | CVE-1999-0675 | Unspecified vulnerability in Checkpoint Firewall-1 3.0/4.0 Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host. | 5.0 |
1999-08-09 | CVE-1999-0674 | The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. | 7.2 |