Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-09-13 | CVE-1999-0691 | Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. | 7.2 |
1999-09-13 | CVE-1999-0689 | The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. | 7.2 |
1999-09-13 | CVE-1999-0687 | The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. | 7.5 |
1999-09-09 | CVE-1999-0697 | Unspecified vulnerability in SCO Openserver 5.0.4/5.0.5 SCO Doctor allows local users to gain root privileges through a Tools option. | 7.2 |
1999-09-08 | CVE-1999-0767 | Unspecified vulnerability in SUN Solaris and Sunos Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable. | 7.2 |
1999-09-02 | CVE-1999-1516 | Unspecified vulnerability in Tenfour TFS Gateway Smtp 3.2 A buffer overflow in TenFour TFS Gateway SMTP mail server 3.2 allows an attacker to crash the mail server and possibly execute arbitrary code by offering more than 128 bytes in a MAIL FROM string. | 7.5 |
1999-09-01 | CVE-1999-1129 | Unspecified vulnerability in Cisco Catalyst 2900 Vlan and IOS Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag. | 7.5 |
1999-09-01 | CVE-1999-0705 | Buffer Overflow vulnerability in Multiple Vendor INN inews Buffer overflow in INN inews program. | 7.5 |
1999-08-31 | CVE-1999-0774 | Unspecified vulnerability in Martin Stover Mars NWE 0.99 Buffer overflows in Mars NetWare Emulation (NWE, mars_nwe) package via long directory names. | 7.2 |
1999-08-30 | CVE-1999-1513 | Unspecified vulnerability in 3Com Superstack II HUB 2.10 Management information base (MIB) for a 3Com SuperStack II hub running software version 2.10 contains an object identifier (.1.3.6.1.4.1.43.10.4.2) that is accessible by a read-only community string, but lists the entire table of community strings, which could allow attackers to conduct unauthorized activities. | 7.5 |