Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1994-11-30 | CVE-1999-1303 | Unspecified vulnerability in SCO products Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access. | 7.2 |
1994-11-30 | CVE-1999-1302 | Unspecified vulnerability in SCO products Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access. | 7.2 |
1994-11-30 | CVE-1999-1248 | Unspecified vulnerability in HP Hp-Ux Vulnerability in Support Watch (aka SupportWatch) in HP-UX 8.0 through 9.0 allows local users to gain privileges. | 4.6 |
1994-10-02 | CVE-1999-1022 | Unspecified vulnerability in SGI Irix 4/5.2/5.3 serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program. | 6.2 |
1994-09-21 | CVE-1999-1238 | Unspecified vulnerability in HP Hp-Ux Vulnerability in CORE-DIAG fileset in HP message catalog in HP-UX 9.05 and earlier allows local users to gain privileges. | 4.6 |
1994-08-11 | CVE-1999-1219 | Unspecified vulnerability in SGI Irix 5.1/5.2 Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command. | 7.2 |
1994-08-09 | CVE-1999-1494 | Unspecified vulnerability in SGI Irix colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument. | 2.1 |
1994-07-20 | CVE-1999-1552 | Unspecified vulnerability in IBM AIX dpsexec (DPS Server) when running under XDM in IBM AIX 3.2.5 and earlier does not properly check privileges, which allows local users to overwrite arbitrary files and gain privileges. | 7.2 |
1994-07-13 | CVE-1999-1239 | Unspecified vulnerability in HP Hp-Ux 9 HP-UX 9.x does not properly enable the Xauthority mechanism in certain conditions, which could allow local users to access the X display even when they have not explicitly been authorized to do so. | 4.6 |
1994-06-09 | CVE-1999-0207 | Unspecified vulnerability in Great Circle Associates Majordomo 1.90/1.91 Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command. | 7.5 |