Show filters
63 Total Results
Displaying 11-20 of 63
Sort by:
Attacker Value
Unknown

CVE-2000-0118

Disclosure Date: June 09, 1999 (last updated February 22, 2025)
The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing.
0
Attacker Value
Unknown

CVE-1999-1297

Disclosure Date: July 15, 1998 (last updated February 22, 2025)
cmdtool in OpenWindows 3.0 and XView 3.0 in SunOS 4.1.4 and earlier allows attackers with physical access to the system to display unechoed characters (such as those from password prompts) via the L2/AGAIN key.
0
Attacker Value
Unknown

CVE-1999-0303

Disclosure Date: May 21, 1998 (last updated February 22, 2025)
Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.
0
Attacker Value
Unknown

CVE-1999-0009

Disclosure Date: April 08, 1998 (last updated February 22, 2025)
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
0
Attacker Value
Unknown

CVE-1999-0011

Disclosure Date: April 08, 1998 (last updated February 22, 2025)
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
0
Attacker Value
Unknown

CVE-1999-0010

Disclosure Date: April 08, 1998 (last updated February 22, 2025)
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
0
Attacker Value
Unknown

CVE-1999-0003

Disclosure Date: April 01, 1998 (last updated February 22, 2025)
Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd).
0
Attacker Value
Unknown

CVE-1999-0320

Disclosure Date: March 01, 1998 (last updated February 22, 2025)
SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files.
0
Attacker Value
Unknown

CVE-1999-0015

Disclosure Date: December 16, 1997 (last updated February 22, 2025)
Teardrop IP denial of service.
0
Attacker Value
Unknown

CVE-1999-0104

Disclosure Date: December 16, 1997 (last updated February 22, 2025)
A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2.
0