Vulnerabilities > Low
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1997-03-05 | CVE-1999-1408 | Denial of Service vulnerability in Multiple Vendor connect() Vulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost. | 2.1 |
1997-03-01 | CVE-1999-0106 | Finger redirection allows finger bombs. local low complexity | 2.1 |
1997-03-01 | CVE-1999-0105 | finger allows recursive searches by using a long string of @ symbols. local low complexity | 2.1 |
1997-01-01 | CVE-1999-0171 | Unspecified vulnerability in Linux Kernel 2.6.20.1 Denial of service in syslog by sending it a large number of superfluous messages. | 2.1 |
1996-12-24 | CVE-1999-1251 | Unspecified vulnerability in HP Hp-Ux 10.10/10.20 Vulnerability in direct audio user space code on HP-UX 10.20 and 10.10 allows local users to cause a denial of service. | 2.1 |
1996-11-17 | CVE-1999-1221 | Unspecified vulnerability in Digital Unix 3 dxchpwd in Digital Unix (OSF/1) 3.x allows local users to modify arbitrary files via a symlink attack on the dxchpwd.log file. | 2.1 |
1996-08-15 | CVE-1999-0132 | Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access. | 2.1 |
1996-08-14 | CVE-1999-0133 | Unspecified vulnerability in Adobe Framemaker fm_fls license server for Adobe Framemaker allows local users to overwrite arbitrary files and gain root access. | 2.1 |
1996-07-16 | CVE-1999-1572 | cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files. | 2.1 |
1996-06-07 | CVE-1999-1205 | Unspecified vulnerability in HP Hp-Ux 10.00/10.01 nettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information. | 2.1 |