Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1994-05-18 | CVE-1999-1134 | Unspecified vulnerability in HP Hp-Ux 9 Vulnerability in Vue 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4038, PHSS_4055, and PHSS_4066. | 7.2 |
1994-05-13 | CVE-1999-1388 | Unspecified vulnerability in SUN Sunos 4.1 passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument. | 6.2 |
1994-05-04 | CVE-1999-1146 | Unspecified vulnerability in HP Hp-Ux Vulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users to access arbitrary files and gain privileges. | 7.2 |
1994-04-20 | CVE-1999-1135 | Unspecified vulnerability in HP Hp-Ux 9 Vulnerability in VUE 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4994 and PHSS_5438. | 7.2 |
1994-03-21 | CVE-1999-0120 | Unspecified vulnerability in SUN Sunos 4.1 Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. | 7.2 |
1994-02-24 | CVE-1999-0338 | Unspecified vulnerability in IBM AIX 3.2.4/3.2.5 AIX Licensed Program Product performance tools allow local users to gain root access. | 7.2 |
1994-02-07 | CVE-1999-1242 | Unspecified vulnerability in HP Hp-Ux 9.00/9.01 Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges. | 4.6 |
1994-01-01 | CVE-1999-0181 | Unspecified vulnerability in Rpc.Walld The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands. network rpc-walld | 6.8 |
1993-12-16 | CVE-1999-0334 | Unspecified vulnerability in SUN Solaris and Sunos In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root access. | 7.2 |
1993-10-01 | CVE-1999-1137 | Unspecified vulnerability in SUN Solaris and Sunos The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone. | 2.1 |