Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1998-07-10 | CVE-1999-1435 | Buffer Overflow vulnerability in NEC Socks 5 1.0R5 Buffer overflow in libsocks5 library of Socks 5 (socks5) 1.0r5 allows local users to gain privileges via long environmental variables. | 7.2 |
1998-07-09 | CVE-1999-0102 | Unspecified vulnerability in Seattle LAB Software Slmail 3.0.2421 Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line. | 7.5 |
1998-07-08 | CVE-1999-1436 | Unspecified vulnerability in RAY Chan WWW Authorization Gateway 0.1 Ray Chan WWW Authorization Gateway 0.1 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the "user" parameter. | 7.5 |
1998-07-07 | CVE-1999-1437 | Unspecified vulnerability in Ralf S. Engelschall Eperl 2.2.12 ePerl 2.2.12 allows remote attackers to read arbitrary files and possibly execute certain commands by specifying a full pathname of the target file as an argument to bar.phtml. | 7.5 |
1998-07-06 | CVE-1999-1574 | Unspecified vulnerability in IBM AIX 4.3.0 Buffer overflow in the lex routines of nslookup for AIX 4.3 may allow attackers to cause a core dump and possibly execute arbitrary code via "long input strings." | 7.5 |
1998-07-01 | CVE-1999-0314 | Unspecified vulnerability in SGI Irix 6.4 ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | 7.2 |
1998-07-01 | CVE-1999-0313 | Unspecified vulnerability in SGI Irix 6.4 disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames. | 7.2 |
1998-06-30 | CVE-1999-1150 | Unspecified vulnerability in Livingston Portmaster Initial Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions. | 7.5 |
1998-06-29 | CVE-1999-1556 | Unspecified vulnerability in Microsoft SQL Server 6.5 Microsoft SQL Server 6.5 uses weak encryption for the password for the SQLExecutiveCmdExec account and stores it in an accessible portion of the registry, which could allow local users to gain privileges by reading and decrypting the CmdExecAccount value. | 7.2 |
1998-06-26 | CVE-1999-1038 | Unspecified vulnerability in Tamu Tiger 2.2.3 Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable. | 7.2 |