System vulnerabilities
Showing 8851 - 8859 of 8.9K CVEs
- CVE-1999-0628 Published Jul 1, 1997
The rwho/rwhod service is running, which exposes machine status and user information.
- CVE-1999-0195 Published Jul 1, 1997
Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
- CVE-1999-0074 Published Jul 1, 1997
Listening TCP ports are sequentially allocated, allowing spoofing attacks.
- CVE-1999-0165 Published Mar 1, 1997
NFS cache poisoning.
- CVE-1999-0171 Published Jan 1, 1997
Denial of service in syslog by sending it a large number of superfluous messages.
- CVE-1999-0128 Published Dec 18, 1996
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.
- CVE-1999-1572 Published Jul 16, 1996
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
- CVE-1999-0138 Published Jun 26, 1996
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
- CVE-1999-0245 Published Sep 7, 1995
Some configurations of NIS+ in Linux allowed attackers to log in as the user "+".
The rwho/rwhod service is running, which exposes machine status and user information.
Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1.
Listening TCP ports are sequentially allocated, allowing spoofing attacks.
NFS cache poisoning.
Denial of service in syslog by sending it a large number of superfluous messages.
Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death.
cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files.
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
Some configurations of NIS+ in Linux allowed attackers to log in as the user "+".