VUMETRIC
CYBER PORTAL
Dashboard
Security News
Latest Vulnerabilities
Browse Vulnerabilities
by Vendors
by Products
by Categories
Weekly Reports
Vulnerabilities
> Critical
Exclude new CVEs:
DATE
CVE
VULNERABILITY TITLE
RISK
1997-07-01
CVE-1999-0169
Unspecified vulnerability in SUN NFS
NFS allows attackers to read and write any file on the system by specifying a false UID.
network
low complexity
sun
critical
10.0
10
1997-06-01
CVE-1999-0799
Unspecified vulnerability in CMU Bootpd
Buffer overflow in bootpd 2.4.3 and earlier via a long boot file location.
network
low complexity
cmu
critical
10.0
10
1997-04-07
CVE-1999-0042
Buffer overflow in University of Washington's implementation of IMAP and POP servers.
network
low complexity
university-of-washington
ibm
redhat
caldera
bsdi
critical
10.0
10
1997-03-05
CVE-1999-0299
Unspecified vulnerability in Freebsd 6.2
Buffer overflow in FreeBSD lpd through long DNS hostnames.
network
freebsd
critical
9.3
9.3
1997-03-01
CVE-1999-0165
NFS cache poisoning.
network
low complexity
sun
bsdi
linux
critical
10.0
10
1997-02-03
CVE-1999-1299
rcp on various Linux systems including Red Hat 4.0 allows a "nobody" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file.
network
low complexity
redhat
slackware
critical
10.0
10
1997-02-02
CVE-1999-1160
Unspecified vulnerability in HP Hp-Ux 10/9
Vulnerability in ftpd/kftpd in HP-UX 10.x and 9.x allows local and possibly remote users to gain root privileges.
network
low complexity
hp
critical
10.0
10
1997-01-28
CVE-1999-0047
MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4.
network
low complexity
eric-allman
bsdi
caldera
critical
10.0
10
1997-01-27
CVE-1999-0048
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
network
low complexity
debian
ibm
nec
critical
10.0
10
1997-01-01
CVE-1999-0572
Unspecified vulnerability in Microsoft Windows 2000 and Windows NT
.reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
network
microsoft
critical
9.3
9.3
«
Previous
1
2
...
2699
2700
2701
(current)
2702
2703
2704
»
Next