Total
210374 CVE
CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
---|---|---|---|---|---|
CVE-1999-0078 | 10 Bsdi, Freebsd, Hp and 7 more | 11 Bsd Os, Freebsd, Hp-ux and 8 more | 2022-08-17 | 1.9 LOW | N/A |
pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call. | |||||
CVE-1999-0142 | 2 Netscape, Sun | 2 Navigator, Java | 2022-08-17 | 7.5 HIGH | N/A |
The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts. | |||||
CVE-1999-0143 | 3 Mit, Process Software, Sun | 4 Kerberos, Kerberos 5, Multinet and 1 more | 2022-08-17 | 4.6 MEDIUM | N/A |
Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys. | |||||
CVE-1999-0208 | 3 Ibm, Nec, Sgi | 5 Aix, Asl Ux 4800, Ews-ux V and 2 more | 2022-08-17 | 10.0 HIGH | N/A |
rpc.ypupdated (NIS) allows remote users to execute arbitrary commands. | |||||
CVE-1999-0123 | 1 Slackware | 1 Slackware Linux | 2022-08-17 | 3.7 LOW | N/A |
Race condition in Linux mailx command allows local users to read user files. | |||||
CVE-1999-0241 | 3 Sgi, Sun, Xfree86 Project | 4 Irix, Solaris, Sunos and 1 more | 2022-08-17 | 10.0 HIGH | N/A |
Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm. | |||||
CVE-1999-0099 | 5 Bsdi, Convex, Cray and 2 more | 7 Bsd Os, Convexos, Spp-ux and 4 more | 2022-08-17 | 10.0 HIGH | N/A |
Buffer overflow in syslog utility allows local or remote attackers to gain root privileges. | |||||
CVE-1999-0073 | 2 Digital, Sgi | 3 Osf 1, Unix, Irix | 2022-08-17 | 10.0 HIGH | N/A |
Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. | |||||
CVE-1999-0218 | 1 Livingston Portmaster | 1 Portmaster | 2022-08-17 | 5.0 MEDIUM | N/A |
Livingston portmaster machines could be rebooted via a series of commands. | |||||
CVE-1999-0245 | 1 Linux | 1 Linux Kernel | 2022-08-17 | 4.6 MEDIUM | N/A |
Some configurations of NIS+ in Linux allowed attackers to log in as the user "+". | |||||
CVE-1999-0155 | 1 Aladdin Enterprises | 1 Ghostscript | 2022-08-17 | 7.5 HIGH | N/A |
The ghostscript command with the -dSAFER option allows remote attackers to execute commands. | |||||
CVE-1999-0203 | 1 Eric Allman | 1 Sendmail | 2022-08-17 | 10.0 HIGH | N/A |
In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program. | |||||
CVE-1999-0172 | 1 Matt Wright | 1 Formmail | 2022-08-17 | 7.5 HIGH | N/A |
FormMail CGI program allows remote execution of commands. | |||||
CVE-1999-0151 | 1 Satan | 1 Satan | 2022-08-17 | 7.6 HIGH | N/A |
The SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access. | |||||
CVE-1999-0242 | 1 Slackware | 1 Slackware Linux | 2022-08-17 | 7.5 HIGH | N/A |
Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords. | |||||
CVE-1999-0235 | 1 Ncsa | 1 Ncsa Web Server | 2022-08-17 | 10.0 HIGH | N/A |
Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access. | |||||
CVE-1999-0207 | 1 Great Circle Associates | 1 Majordomo | 2022-08-17 | 7.5 HIGH | N/A |
Remote attacker can execute commands through Majordomo using the Reply-To field and a "lists" command. | |||||
CVE-1999-0181 | 1 Rpc.walld | 1 Rpc.walld | 2022-08-17 | 6.8 MEDIUM | N/A |
The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands. | |||||
CVE-1999-0124 | 1 University Of Minnesota | 1 Gopherd | 2022-08-17 | 10.0 HIGH | N/A |
Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon. | |||||
CVE-1999-0168 | 1 Sun | 1 Sunos | 2022-08-17 | 7.5 HIGH | N/A |
The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place. For example, NFS file systems could be mounted through the portmapper despite export restrictions. |