Vulnerabilities

DATE CVE VULNERABILITY TITLE RISK
1997-07-10 CVE-1999-0176 Unspecified vulnerability in Webgais Development Team Webgais
The Webgais program allows a remote user to execute arbitrary commands.
network
low complexity
webgais-development-team
7.5
1997-07-08 CVE-1999-0196 Unspecified vulnerability in Webgais Development Team Webgais 1.0
websendmail in Webgais 1.0 allows a remote user to access arbitrary files and execute arbitrary code via the receiver parameter ($VAR_receiver variable).
network
low complexity
webgais-development-team
5.0
1997-07-04 CVE-1999-1326 Unspecified vulnerability in Washington University Wu-Ftpd 2.4
wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files.
network
low complexity
washington-university
5.0
1997-07-01 CVE-1999-0628 The rwho/rwhod service is running, which exposes machine status and user information.
network
low complexity
netbsd ibm freebsd linux
5.0
1997-07-01 CVE-1999-0541 A password for accessing a WWW URL is guessable.
network
low complexity
7.5
1997-07-01 CVE-1999-0533 A DNS server allows inverse queries.
network
low complexity
7.5
1997-07-01 CVE-1999-0526 Unspecified vulnerability in X.Org X11 7.11.1.0
An X server's access control is disabled (e.g.
network
low complexity
x-org
critical
10.0
1997-07-01 CVE-1999-0250 Unspecified vulnerability in DAN Bernstein Qmail
Denial of service in Qmail through long SMTP commands.
network
low complexity
dan-bernstein
critical
10.0
1997-07-01 CVE-1999-0219 Unspecified vulnerability in CAT Soft Serv-U 2.5
Buffer overflow in FTP Serv-U 2.5 allows remote authenticated users to cause a denial of service (crash) via a long (1) CWD or (2) LS (list) command.
network
low complexity
cat-soft
7.8
1997-07-01 CVE-1999-0195 Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
network
low complexity
sgi linux
5.0