Search Results (Refine Search)

Search Parameters:
There are 145,734 matching records.
Displaying matches 145,641 through 145,660.
Vuln ID Summary CVSS Severity
CVE-1999-0203

In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program.

Published: August 17, 1995; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0172

FormMail CGI program allows remote execution of commands.

Published: August 02, 1995; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0066

AnyForm CGI remote execution.

Published: July 31, 1995; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0161

In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering.

Published: July 31, 1995; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-1080

rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf.

Published: May 10, 1995; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-0151

The SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access.

Published: April 03, 1995; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 7.6 HIGH
CVE-1999-1098

Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing.

Published: March 03, 1995; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-1243

SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges.

Published: March 03, 1995; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-1999-0242

Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords.

Published: March 01, 1995; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0235

Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access.

Published: February 17, 1995; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0232

Buffer overflow in NCSA WebServer (version 1.5c) gives remote access.

Published: February 01, 1995; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0077

Predictable TCP sequence numbers allow spoofing.

Published: January 01, 1995; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-2000-0508

rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request.

Published: December 19, 1994; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-1248

Vulnerability in Support Watch (aka SupportWatch) in HP-UX 8.0 through 9.0 allows local users to gain privileges.

Published: November 30, 1994; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-1999-1302

Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access.

Published: November 30, 1994; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-1303

Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access.

Published: November 30, 1994; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-1304

Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access.

Published: November 30, 1994; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-1305

Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.

Published: November 30, 1994; 12:00:00 AM -0500
V3.x:(not available)
V2.0: 7.2 HIGH
CVE-1999-1022

serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program.

Published: October 02, 1994; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 6.2 MEDIUM
CVE-1999-1238

Vulnerability in CORE-DIAG fileset in HP message catalog in HP-UX 9.05 and earlier allows local users to gain privileges.

Published: September 21, 1994; 12:00:00 AM -0400
V3.x:(not available)
V2.0: 4.6 MEDIUM