Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1998-09-03 | CVE-1999-0779 | Unspecified vulnerability in HP Hp-Ux Denial of service in HP-UX SharedX recserv program. | 5.0 |
1998-09-01 | CVE-1999-1292 | Unspecified vulnerability in Kolban Webcam32 Buffer overflow in web administration feature of Kolban Webcam32 4.8.3 and earlier allows remote attackers to execute arbitrary commands via a long URL. | 7.5 |
1998-09-01 | CVE-1999-0792 | Unspecified vulnerability in Osicom Routermate ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration. | 5.0 |
1998-09-01 | CVE-1999-0310 | Unspecified vulnerability in SSH 1.2.25 SSH 1.2.25 on HP-UX allows access to new user accounts. | 7.5 |
1998-09-01 | CVE-1999-0302 | Unspecified vulnerability in SUN Solaris and Sunos SunOS/Solaris FTP clients can be forced to execute arbitrary commands from a malicious FTP server. | 7.5 |
1998-09-01 | CVE-1999-0162 | Unspecified vulnerability in Cisco IOS 11.2 The "established" keyword in some Cisco IOS software allowed an attacker to bypass filtering. | 5.0 |
1998-08-31 | CVE-1999-0158 | Unspecified vulnerability in Cisco PIX Firewall Software 4.1(6)/4.2(1) Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known. | 5.0 |
1998-08-31 | CVE-1999-0065 | Unspecified vulnerability in SUN Solaris and Sunos Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands. | 7.5 |
1998-08-27 | CVE-1999-1041 | Unspecified vulnerability in SCO Openserver and Unix Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file. | 7.2 |
1998-08-23 | CVE-1999-1417 | Unspecified vulnerability in Inso Answerbook2 Format string vulnerability in AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via encoded % characters in an HTTP request, which is improperly logged. | 7.5 |