Vulnerabilities > High
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1998-09-01 | CVE-1999-0310 | Unspecified vulnerability in SSH 1.2.25 SSH 1.2.25 on HP-UX allows access to new user accounts. | 7.5 |
1998-09-01 | CVE-1999-0302 | Unspecified vulnerability in SUN Solaris and Sunos SunOS/Solaris FTP clients can be forced to execute arbitrary commands from a malicious FTP server. | 7.5 |
1998-08-31 | CVE-1999-0065 | Unspecified vulnerability in SUN Solaris and Sunos Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands. | 7.5 |
1998-08-27 | CVE-1999-1041 | Unspecified vulnerability in SCO Openserver and Unix Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file. | 7.2 |
1998-08-23 | CVE-1999-1417 | Unspecified vulnerability in Inso Answerbook2 Format string vulnerability in AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via encoded % characters in an HTTP request, which is improperly logged. | 7.5 |
1998-08-04 | CVE-1999-0262 | Unspecified vulnerability in Renaud Deraison Faxsurvey Hylafax faxsurvey CGI script on Linux allows remote attackers to execute arbitrary commands via shell metacharacters in the query string. | 7.5 |
1998-08-03 | CVE-1999-0062 | Unspecified vulnerability in Openbsd 2.3 The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage. | 7.2 |
1998-08-01 | CVE-1999-0516 | An SNMP community name is guessable. network low complexity | 7.5 |
1998-08-01 | CVE-1999-0339 | Unspecified vulnerability in SUN Solaris and Sunos Buffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access. | 7.2 |
1998-08-01 | CVE-1999-0333 | Unspecified vulnerability in HP Hp-Ux HP OpenView Omniback allows remote execution of commands as root via spoofing, and local users can gain root access via a symlink attack. | 7.5 |