Vulnerabilities > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1994-05-13 | CVE-1999-1388 | Unspecified vulnerability in SUN Sunos 4.1 passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument. | 6.2 |
1994-02-07 | CVE-1999-1242 | Unspecified vulnerability in HP Hp-Ux 9.00/9.01 Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges. | 4.6 |
1994-01-01 | CVE-1999-0181 | Unspecified vulnerability in Rpc.Walld The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands. network rpc-walld | 6.8 |
1993-09-16 | CVE-1999-1215 | Unspecified vulnerability in Novell Netware 4.0/4.01 LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges. | 4.6 |
1993-05-24 | CVE-1999-1162 | Unspecified vulnerability in SCO Open Desktop and Unix Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system. | 6.4 |
1993-01-13 | CVE-1999-0312 | Unspecified vulnerability in HP Hp-Ux HP ypbind allows attackers with root privileges to modify NIS data. | 5.0 |
1991-12-06 | CVE-1999-0167 | Unspecified vulnerability in SUN Sunos 4.1.1 In SunOS, NFS file handles could be guessed, giving unauthorized access to the exported file system. | 4.6 |
1991-10-22 | CVE-1999-1468 | rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable. | 6.2 |
1991-08-23 | CVE-1999-1415 | Unspecified vulnerability in Digital Ultrix Vulnerability in /usr/bin/mail in DEC ULTRIX before 4.2 allows local users to gain privileges. | 4.6 |
1991-01-15 | CVE-1999-1258 | Unspecified vulnerability in SUN Sunos rpc.pwdauthd in SunOS 4.1.1 and earlier does not properly prevent remote access to the daemon, which allows remote attackers to obtain sensitive system information. | 5.0 |