Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
1996-02-21 CVE-1999-0143 Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys.
local
low complexity
process-software mit sun
4.6
1996-02-08 CVE-1999-0103 Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a.
network
low complexity
5.0
1995-10-01 CVE-1999-0218 Unspecified vulnerability in Livingston Portmaster
Livingston portmaster machines could be rebooted via a series of commands.
network
low complexity
livingston-portmaster
5.0
1995-09-07 CVE-1999-0245 Unspecified vulnerability in Linux Kernel 2.6.20.1
Some configurations of NIS+ in Linux allowed attackers to log in as the user "+".
local
low complexity
linux
4.6
1995-08-29 CVE-1999-0164 Unspecified vulnerability in SUN Sunos 5.3/5.4
A race condition in the Solaris ps command allows an attacker to overwrite critical files.
local
high complexity
sun
6.2
1995-03-03 CVE-1999-1243 Unspecified vulnerability in SGI Irix
SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges.
local
low complexity
sgi
4.6
1995-03-03 CVE-1999-1098 Unspecified vulnerability in BSD
Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing.
network
low complexity
bsd
5.0
1995-01-01 CVE-1999-0077 Unspecified vulnerability in Microsoft Windows NT 4.0
Predictable TCP sequence numbers allow spoofing.
network
low complexity
microsoft
5.0
1994-12-19 CVE-2000-0508 rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request.
network
low complexity
debian mandrakesoft redhat
5.0
1994-11-30 CVE-1999-1248 Unspecified vulnerability in HP Hp-Ux
Vulnerability in Support Watch (aka SupportWatch) in HP-UX 8.0 through 9.0 allows local users to gain privileges.
local
low complexity
hp
4.6