Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1996-02-21 | CVE-1999-0143 | Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys. | 4.6 |
1996-02-08 | CVE-1999-0103 | Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. network low complexity | 5.0 |
1996-02-02 | CVE-1999-1491 | Unspecified vulnerability in Redhat Linux 2.1 abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. | 7.2 |
1996-01-03 | CVE-1999-1319 | Unspecified vulnerability in SGI Irix Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations. | 10.0 |
1996-01-02 | CVE-1999-1186 | rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter. | 7.2 |
1995-12-12 | CVE-1999-0208 | rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. | 10.0 |
1995-12-01 | CVE-1999-0325 | Unspecified vulnerability in HP Hp-Ux 8/9 vhe_u_mnt program in HP-UX allows local users to create root files through symlinks. | 7.2 |
1995-12-01 | CVE-1999-0316 | Unspecified vulnerability in SAM Lantinga Splitvt Buffer overflow in Linux splitvt command gives root access to local users. | 7.2 |
1995-12-01 | CVE-1999-0123 | Unspecified vulnerability in Slackware Linux 3.0 Race condition in Linux mailx command allows local users to read user files. | 3.7 |
1995-11-30 | CVE-1999-0080 | Unspecified vulnerability in Washington University Wu-Ftpd 2.4 Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the "site exec" command. | 10.0 |