Search Results (33 CVEs found)

CVE Vendors Products Updated CVSS v3.1
CVE-1999-0714 1 Digital 1 Unix 2025-04-03 N/A
Vulnerability in Compaq Tru64 UNIX edauth command.
CVE-1999-1032 1 Digital 1 Ultrix 2025-04-03 N/A
Vulnerability in LAT/Telnet Gateway (lattelnet) on Ultrix 4.1 and 4.2 allows attackers to gain root privileges.
CVE-1999-1044 1 Digital 1 Unix 2025-04-03 N/A
Vulnerability in Advanced File System Utility (advfs) in Digital UNIX 4.0 through 4.0d allows local users to gain privileges.
CVE-1999-1210 1 Digital 1 Unix 2025-04-03 N/A
xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a symlink attack on a core dump file, which is created when xterm is called with a DISPLAY environmental variable set to a display that xterm cannot access.
CVE-1999-1221 1 Digital 1 Unix 2025-04-03 N/A
dxchpwd in Digital Unix (OSF/1) 3.x allows local users to modify arbitrary files via a symlink attack on the dxchpwd.log file.
CVE-1999-1415 1 Digital 1 Ultrix 2025-04-03 N/A
Vulnerability in /usr/bin/mail in DEC ULTRIX before 4.2 allows local users to gain privileges.
CVE-1999-1458 1 Digital 1 Unix 2025-04-03 N/A
Buffer overflow in at program in Digital UNIX 4.0 allows local users to gain root privileges via a long command line argument.
CVE-2000-0314 5 Debian, Digital, Netbsd and 2 more 5 Debian Linux, Unix, Netbsd and 2 more 2025-04-03 N/A
traceroute in NetBSD 1.3.3 and Linux systems allows local users to flood other systems by providing traceroute with a large waittime (-w) option, which is not parsed properly and sets the time delay for sending packets to zero.
CVE-2000-0315 5 Debian, Digital, Netbsd and 2 more 5 Debian Linux, Unix, Netbsd and 2 more 2025-04-03 N/A
traceroute in NetBSD 1.3.3 and Linux systems allows local unprivileged users to modify the source address of the packets, which could be used in spoofing attacks.
CVE-2000-0845 1 Digital 1 Unix 2025-04-03 N/A
kdebug daemon (kdebugd) in Digital Unix 4.0F allows remote attackers to read arbitrary files by specifying the full file name in the initialization packet.
CVE-2001-0134 2 Compaq, Digital 15 Armada Insight Manager, Enterprise Volume Manager-command Scripter, Foundation Agents and 12 more 2025-04-03 N/A
Buffer overflow in cpqlogin.htm in web-enabled agents for various Compaq management software products such as Insight Manager and Management Agents allows remote attackers to execute arbitrary commands via a long user name.
CVE-2001-0369 1 Digital 1 Unix 2025-04-03 N/A
Buffer overflow in lpsched on DGUX version R4.20MU06 and MU02 allows a local attacker to obtain root access via a long command line argument (non-existent printer name).
CVE-1999-0138 7 Apple, Digital, Freebsd and 4 more 9 A Ux, Osf 1, Freebsd and 6 more 2025-04-03 N/A
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
CVE-1999-0303 4 Digital, Netbsd, Openbsd and 1 more 5 Osf 1, Netbsd, Openbsd and 2 more 2025-04-03 N/A
Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames.
CVE-1999-0358 1 Digital 1 Unix 2025-04-03 N/A
Digital Unix 4.0 has a buffer overflow in the inc program of the mh package.
CVE-1999-0406 1 Digital 1 Unix 2025-04-03 N/A
Digital Unix Networker program nsralist has a buffer overflow which allows local users to obtain root privilege.
CVE-1999-0687 4 Cde, Digital, Ibm and 1 more 5 Cde, Unix, Aix and 2 more 2025-04-03 N/A
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
CVE-1999-0691 4 Cde, Digital, Ibm and 1 more 5 Cde, Unix, Aix and 2 more 2025-04-03 N/A
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
CVE-1999-1057 1 Digital 1 Vms 2025-04-03 N/A
VMS 4.0 through 5.3 allows local users to gain privileges via the ANALYZE/PROCESS_DUMP dcl command.
CVE-1999-1225 5 Digital, Linux, Netbsd and 2 more 5 Ultrix, Linux Kernel, Netbsd and 2 more 2025-04-03 N/A
rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not.