Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
1998-12-01 CVE-1999-0478 Unspecified vulnerability in Sendmail
Denial of service in HP-UX sendmail 8.8.6 related to accepting connections.
network
low complexity
sendmail
5.0
1998-12-01 CVE-1999-0463 Unspecified vulnerability in L0Pht L0Phtcrack 2.5
Remote attackers can perform a denial of service using IRIX fcagent.
network
low complexity
l0pht
5.0
1998-12-01 CVE-1999-0342 Unspecified vulnerability in PAM
Linux PAM modules allow local users to gain root access using temporary files.
local
high complexity
pam
6.2
1998-11-19 CVE-1999-1288 Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program.
local
low complexity
samba caldera redhat turbolinux
4.6
1998-11-18 CVE-1999-0780 KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file.
local
low complexity
freebsd kde linux
4.6
1998-11-12 CVE-1999-1322 The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.
local
low complexity
broadcom microsoft
4.6
1998-11-12 CVE-1999-1025 Unspecified vulnerability in SUN Solaris and Sunos
CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user's console session when the host is an NIS+ client, which allows others with physical access to login with any string.
local
low complexity
sun
4.6
1998-10-26 CVE-1999-0215 Unspecified vulnerability in SGI Irix
Routed allows attackers to append data to files.
network
low complexity
sgi
6.4
1998-10-13 CVE-1999-0053 Unspecified vulnerability in Freebsd 6.2
TCP RST denial of service in FreeBSD.
network
low complexity
freebsd
5.0
1998-10-05 CVE-1999-1291 Unspecified vulnerability in Microsoft Windows 95 and Windows NT
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target.
network
low complexity
microsoft
5.0