Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1998-07-07 | CVE-1999-1437 | Unspecified vulnerability in Ralf S. Engelschall Eperl 2.2.12 ePerl 2.2.12 allows remote attackers to read arbitrary files and possibly execute certain commands by specifying a full pathname of the target file as an argument to bar.phtml. | 7.5 |
1998-07-06 | CVE-1999-1574 | Unspecified vulnerability in IBM AIX 4.3.0 Buffer overflow in the lex routines of nslookup for AIX 4.3 may allow attackers to cause a core dump and possibly execute arbitrary code via "long input strings." | 7.5 |
1998-07-03 | CVE-1999-1409 | The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail. | 2.1 |
1998-07-03 | CVE-1999-1202 | Unspecified vulnerability in Startech Pop3 Proxy Server and Telnet Server StarTech (1) POP3 proxy server and (2) telnet server allows remote attackers to cause a denial of service via a long USER command. | 5.0 |
1998-07-01 | CVE-1999-0494 | Unspecified vulnerability in Wingate Denial of service in WinGate proxy through a buffer overflow in POP3. | 5.0 |
1998-07-01 | CVE-1999-0314 | Unspecified vulnerability in SGI Irix 6.4 ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | 7.2 |
1998-07-01 | CVE-1999-0313 | Unspecified vulnerability in SGI Irix 6.4 disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | 7.2 |
1998-06-30 | CVE-1999-1441 | Unspecified vulnerability in Linux Kernel 2.0.34 Linux 2.0.34 does not properly prevent users from sending SIGIO signals to arbitrary processes, which allows local users to cause a denial of service by sending SIGIO to processes that do not catch it. | 2.1 |
1998-06-30 | CVE-1999-1150 | Unspecified vulnerability in Livingston Portmaster Initial Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions. | 7.5 |
1998-06-29 | CVE-1999-1556 | Unspecified vulnerability in Microsoft SQL Server 6.5 Microsoft SQL Server 6.5 uses weak encryption for the password for the SQLExecutiveCmdExec account and stores it in an accessible portion of the registry, which could allow local users to gain privileges by reading and decrypting the CmdExecAccount value. | 7.2 |