Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-01-01 | CVE-1999-0240 | Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy. network low complexity | 7.5 |
1998-12-26 | CVE-1999-0968 | Unspecified vulnerability in James Seter BNC IRC Buffer overflow in BNC IRC proxy allows remote attackers to gain privileges. | 7.5 |
1998-12-25 | CVE-1999-1278 | Unspecified vulnerability in Nlog nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl. | 7.5 |
1998-12-17 | CVE-1999-0188 | Unspecified vulnerability in SUN Solaris and Sunos The passwd command in Solaris can be subjected to a denial of service. | 7.2 |
1998-12-12 | CVE-1999-0139 | Unspecified vulnerability in SUN Solaris and Sunos Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access. | 7.2 |
1998-12-07 | CVE-1999-1276 | fte-console in the fte package before 0.46b-4.1 does not drop root privileges, which allows local users to gain root access via the virtual console device. | 7.2 |
1998-12-04 | CVE-1999-1147 | Unspecified vulnerability in Platinum Policy Compliance Manager 7.0 Buffer overflow in Platinum Policy Compliance Manager (PCM) 7.0 allows remote attackers to execute arbitrary commands via a long string to the Agent port (1827), which is handled by smaxagent.exe. | 7.5 |
1998-12-03 | CVE-1999-1280 | Unspecified vulnerability in Hummingbird Exceed 6.0.1.0 Hummingbird Exceed 6.0.1.0 inadvertently includes a DLL that was meant for development and testing, which logs user names and passwords in cleartext in the test.log file. | 7.5 |
1998-12-01 | CVE-1999-0321 | Unspecified vulnerability in SUN Solaris Buffer overflow in Solaris kcms_configure command allows local users to gain root access. | 7.2 |
1998-11-30 | CVE-1999-1073 | Unspecified vulnerability in Excite EWS 1.1 Excite for Web Servers (EWS) 1.1 records the first two characters of a plaintext password in the beginning of the encrypted password, which makes it easier for an attacker to guess passwords via a brute force or dictionary attack. | 7.2 |