Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
1999-02-02 CVE-1999-0383 Unspecified vulnerability in ACC Tigris 10.5.8
ACC Tigris allows public access without a login.
network
low complexity
acc
7.5
1999-02-02 CVE-1999-0363 SuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise.
local
low complexity
plp suse
7.2
1999-02-01 CVE-1999-0373 Unspecified vulnerability in Debian Linux 2.0
Buffer overflow in the "Super" utility in Debian GNU/Linux, and other operating systems, allows local users to execute commands as root.
local
low complexity
debian
7.2
1999-02-01 CVE-1999-0358 Unspecified vulnerability in Digital Unix
Digital Unix 4.0 has a buffer overflow in the inc program of the mh package.
local
low complexity
digital
7.2
1999-02-01 CVE-1999-0291 Unspecified vulnerability in Qbik Wingate
The WinGate proxy is installed without a password, which allows remote attackers to redirect connections without authentication.
network
low complexity
qbik
7.5
1999-01-30 CVE-1999-0360 Unspecified vulnerability in Microsoft Site Server 2.0
MS Site Server 2.0 with IIS 4 can allow users to upload content, including ASP, to the target web site, thus allowing them to execute commands remotely.
local
low complexity
microsoft
7.2
1999-01-28 CVE-1999-0952 Unspecified vulnerability in SUN Solaris and Sunos
Buffer overflow in Solaris lpstat via class argument allows local users to gain root access.
local
low complexity
sun
7.2
1999-01-27 CVE-1999-1450 Unspecified vulnerability in SCO Openserver and Unixware
Vulnerability in (1) rlogin daemon rshd and (2) scheme on SCO UNIX OpenServer 5.0.5 and earlier, and SCO UnixWare 7.0.1 and earlier, allows remote attackers to gain privileges.
network
low complexity
sco
7.5
1999-01-26 CVE-1999-0450 Unspecified vulnerability in Microsoft products
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
network
low complexity
microsoft
7.5
1999-01-26 CVE-1999-0449 Unspecified vulnerability in Microsoft Internet Information Server 4.0
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
network
low complexity
microsoft
7.8