Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
1997-07-01 CVE-1999-0150 Unspecified vulnerability in GNU Fingerd
The Perl fingerd program allows arbitrary command execution from remote users.
network
low complexity
gnu
7.5
1997-07-01 CVE-1999-0147 Unspecified vulnerability in University of Arizona Glimpse Http and Webglimpse
The aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands.
network
low complexity
university-of-arizona
7.5
1997-07-01 CVE-1999-0111 Unspecified vulnerability in IBM AIX
RIP v1 is susceptible to spoofing.
network
low complexity
ibm
5.0
1997-07-01 CVE-1999-0076 Unspecified vulnerability in Washington University Wu-Ftpd
Buffer overflow in wu-ftp from PASV command causes a core dump.
network
low complexity
washington-university
5.0
1997-07-01 CVE-1999-0074 Listening TCP ports are sequentially allocated, allowing spoofing attacks.
network
low complexity
netbsd microsoft freebsd linux
6.4
1997-06-26 CVE-1999-1423 Unspecified vulnerability in SUN Solaris and Sunos
ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g.
local
low complexity
sun
2.1
1997-06-24 CVE-1999-1192 Unspecified vulnerability in SUN Sunos
Buffer overflow in eeprom in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument.
local
low complexity
sun
7.2
1997-06-19 CVE-1999-1483 Unspecified vulnerability in Svgalib
Buffer overflow in zgv in svgalib 1.2.10 and earlier allows local users to execute arbitrary code via a long HOME environment variable.
local
low complexity
svgalib
4.6
1997-06-18 CVE-1999-0957 Unspecified vulnerability in Great Circle Associates Majorcool
MajorCool mj_key_cache program allows local users to modify files via a symlink attack.
local
low complexity
great-circle-associates
2.1
1997-06-13 CVE-1999-1266 Unspecified vulnerability in Metamail Corporation Metamail
rsh daemon (rshd) generates different error messages when a valid username is provided versus an invalid name, which allows remote attackers to determine valid users on the system.
network
low complexity
metamail-corporation
5.0