-
CVE-1999-1265
•
published on September 12, 2001
SMTP server in SLmail 3.1 and earlier allows remote attackers to cause a denial of service via malformed commands whose arguments begin with a "(" (parenthesis) character, such as (1) SEND, (2) VRFY, (3) EXPN, (4) MAIL FROM, (5) RCPT TO.
-
CVE-1999-1266
•
published on September 12, 2001
rsh daemon (rshd) generates different error messages when a valid username is provided versus an invalid name, which allows remote attackers to determine valid users on the system.
-
CVE-1999-1272
•
published on September 12, 2001
Buffer overflows in CDROM Confidence Test program (cdrom) allow local users to gain root privileges.
-
CVE-1999-1273
•
published on September 12, 2001
Squid Internet Object Cache 1.1.20 allows users to bypass access control lists (ACLs) by encoding the URL with hexadecimal escape sequences.
-
CVE-1999-1228
•
published on September 12, 2001
Various modems that do not implement a guard time, or are configured with a guard time of 0, can allow remote attackers to execute arbitrary modem commands such as ATH, ATH0, etc., via a "+++" sequence that appears in ICMP packets, the subject of an e-mail message, IRC commands, and others.
-
CVE-1999-1242
•
published on September 12, 2001
Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges.
-
CVE-1999-1244
•
published on September 12, 2001
IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file.
-
CVE-1999-1267
•
published on September 12, 2001
KDE file manager (kfm) uses a TCP server for certain file operations, which allows remote attackers to modify arbitrary files by sending a copy command to the server.
-
CVE-1999-1261
•
published on September 12, 2001
Buffer overflow in Rainbow Six Multiplayer allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long nickname (nick) command.
-
CVE-1999-1269
•
published on September 12, 2001
Screen savers in KDE beta 3 allows local users to overwrite arbitrary files via a symlink attack on the .kss.pid file.
-
CVE-1999-1275
•
published on September 12, 2001
Lotus cc:Mail release 8 stores the postoffice password in plaintext in a hidden file which has insecure permissions, which allows local users to gain privileges.
-
CVE-1999-1282
•
published on September 12, 2001
RealSystem G2 server stores the administrator password in cleartext in a world-readable configuration file, which allows local users to gain privileges.
-
CVE-1999-1283
•
published on September 12, 2001
Opera 3.2.1 allows remote attackers to cause a denial of service (application crash) via a URL that contains an extra / in the http:// tag.
-
CVE-1999-1287
•
published on September 12, 2001
Vulnerability in Analog 3.0 and earlier allows remote attackers to read arbitrary files via the forms interface.
-
CVE-1999-1291
•
published on September 12, 2001
TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target.
-
CVE-1999-1295
•
published on September 12, 2001
Transarc DCE Distributed File System (DFS) 1.1 for Solaris 2.4 and 2.5 does not properly initialize the grouplist for users who belong to a large number of groups, which could allow those users to gain access to resources that are protected by DFS.
-
CVE-1999-1300
•
published on September 12, 2001
Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration.
-
CVE-1999-1303
•
published on September 12, 2001
Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access.
-
CVE-1999-1305
•
published on September 12, 2001
Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.
-
CVE-1999-1334
•
published on September 12, 2001
Multiple buffer overflows in filter command in Elm 2.4 allows attackers to execute arbitrary commands via (1) long From: headers, (2) long Reply-To: headers, or (3) via a long -f (filterfile) command line argument.