Page 29 of 355 results (0.008 seconds)

CVSS: 7.5EPSS: 0%CPEs: 5EXPL: 0

10 Nov 1999 — Denial of service in BIND named via naptr. • ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt •

CVSS: 7.5EPSS: 1%CPEs: 1EXPL: 0

26 Oct 1999 — genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0903 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

30 Sep 1999 — Buffer overflow in nslookup for AIX 4.3 allows local users to execute arbitrary code via a long hostname command line argument. • http://www-1.ibm.com/support/search.wss?rs=0&q=IY02120&apar=only •

CVSS: 10.0EPSS: 11%CPEs: 3EXPL: 1

28 Sep 1999 — Buffer overflow in AIX ftpd in the libc library. • https://www.exploit-db.com/exploits/19532 •

CVSS: 9.8EPSS: 0%CPEs: 2EXPL: 1

23 Sep 1999 — named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file. • http://marc.info/?l=bugtraq&m=93837026726954&w=2 •

CVSS: 7.8EPSS: 0%CPEs: 28EXPL: 1

13 Sep 1999 — Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. • https://www.exploit-db.com/exploits/19497 •

CVSS: 9.8EPSS: 1%CPEs: 33EXPL: 0

13 Sep 1999 — The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. • http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 •

CVSS: 10.0EPSS: 3%CPEs: 5EXPL: 1

18 Aug 1999 — Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler. • https://www.exploit-db.com/exploits/21093 •

CVSS: 5.5EPSS: 0%CPEs: 2EXPL: 0

11 Aug 1999 — Denial of service in AIX ptrace system call allows local users to crash the system. • http://www.ciac.org/ciac/bulletins/j-055.shtml •

CVSS: 7.8EPSS: 0%CPEs: 11EXPL: 0

06 May 1999 — Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program. • http://marc.info/?l=bugtraq&m=92601792420088&w=2 •