Vulnerabilities > High

DATE CVE VULNERABILITY TITLE RISK
1998-07-09 CVE-1999-0102 Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421
Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line.
network
low complexity
seattle-lab-software
7.5
1998-07-08 CVE-1999-1436 Unspecified vulnerability in RAY Chan WWW Authorization Gateway 0.1
Ray Chan WWW Authorization Gateway 0.1 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the "user" parameter.
network
low complexity
ray-chan
7.5
1998-07-07 CVE-1999-1437 Unspecified vulnerability in Ralf S. Engelschall Eperl 2.2.12
ePerl 2.2.12 allows remote attackers to read arbitrary files and possibly execute certain commands by specifying a full pathname of the target file as an argument to bar.phtml.
network
low complexity
ralf-s-engelschall
7.5
1998-07-06 CVE-1999-1574 Unspecified vulnerability in IBM AIX 4.3.0
Buffer overflow in the lex routines of nslookup for AIX 4.3 may allow attackers to cause a core dump and possibly execute arbitrary code via "long input strings."
network
low complexity
ibm
7.5
1998-07-01 CVE-1999-0314 Unspecified vulnerability in SGI Irix 6.4
ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.
local
low complexity
sgi
7.2
1998-07-01 CVE-1999-0313 Unspecified vulnerability in SGI Irix 6.4
disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames.
local
low complexity
sgi
7.2
1998-06-30 CVE-1999-1150 Unspecified vulnerability in Livingston Portmaster Initial
Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions.
network
low complexity
livingston-portmaster
7.5
1998-06-29 CVE-1999-1556 Unspecified vulnerability in Microsoft SQL Server 6.5
Microsoft SQL Server 6.5 uses weak encryption for the password for the SQLExecutiveCmdExec account and stores it in an accessible portion of the registry, which could allow local users to gain privileges by reading and decrypting the CmdExecAccount value.
local
low complexity
microsoft
7.2
1998-06-26 CVE-1999-1038 Unspecified vulnerability in Tamu Tiger 2.2.3
Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable.
local
low complexity
tamu
7.2
1998-06-26 CVE-1999-1037 Unspecified vulnerability in Coast Satan 1.1.1
rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rex.$$ file.
local
low complexity
coast
7.2