Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1996-07-25 | CVE-1999-0135 | Unspecified vulnerability in SUN Solaris and Sunos admintool in Solaris allows a local user to write to arbitrary files and gain root access. | 7.2 |
1996-07-24 | CVE-1999-0023 | Local user gains root privileges via buffer overflow in rdist, via lookup() function. | 7.2 |
1996-07-16 | CVE-1999-1572 | cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files. | 2.1 |
1996-07-16 | CVE-1999-1301 | Unspecified vulnerability in Freebsd A design flaw in the Z-Modem protocol allows the remote sender of a file to execute arbitrary programs on the client, as implemented in rz in the rzsz module of FreeBSD before 2.1.5, and possibly other programs. | 7.5 |
1996-07-09 | CVE-1999-0137 | Unspecified vulnerability in Fred N. VAN Kempen DIP 3.3.7O The dip program on many Linux systems allows local users to gain root access via a buffer overflow. | 7.2 |
1996-07-01 | CVE-1999-0175 | Unspecified vulnerability in Novell web Server 1.0 The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server. | 5.0 |
1996-06-26 | CVE-1999-0138 | The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access. | 7.2 |
1996-06-07 | CVE-1999-1253 | Unspecified vulnerability in SCO Internet Faststart and Openserver Vulnerability in a kernel error handling routine in SCO OpenServer 5.0.2 and earlier, and SCO Internet FastStart 1.0, allows local users to gain root privileges. | 7.2 |
1996-06-07 | CVE-1999-1205 | Unspecified vulnerability in HP Hp-Ux 10.00/10.01 nettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information. | 2.1 |
1996-05-29 | CVE-1999-0509 | Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands. | 10.0 |