Vulnerabilities > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-03-02 | CVE-1999-1551 | Buffer Overflow DoS vulnerability in Ipswitch IMail Web Service Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL. | 5.0 |
1999-03-01 | CVE-1999-0479 | Denial of service Netscape Enterprise Server with VirtualVault on HP-UX VVOS systems. | 5.0 |
1999-03-01 | CVE-1999-0438 | Unspecified vulnerability in Ramp Networks Webramp 200I and Webramp M3 Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address. | 5.0 |
1999-03-01 | CVE-1999-0437 | Unspecified vulnerability in Ramp Networks Webramp Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port. | 5.0 |
1999-03-01 | CVE-1999-0436 | Unspecified vulnerability in HP Desms and Hp-Ux Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges. | 4.6 |
1999-03-01 | CVE-1999-0432 | Unspecified vulnerability in HP Hp-Ux 11.00 ftp on HP-UX 11.00 allows local users to gain privileges. | 4.6 |
1999-03-01 | CVE-1999-0431 | Unspecified vulnerability in Linux Kernel Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service. | 5.0 |
1999-03-01 | CVE-1999-0430 | Unspecified vulnerability in Cisco products Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. | 5.0 |
1999-03-01 | CVE-1999-0419 | When the Microsoft SMTP service attempts to send a message to a server and receives a 4xx error code, it quickly and repeatedly attempts to redeliver the message, causing a denial of service. network low complexity | 5.0 |
1999-03-01 | CVE-1999-0414 | Unspecified vulnerability in Linux Kernel In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection. | 5.0 |