Risk 1995

Overview of the different risk assignments of different sources of the documented vulnerabilities.

13719IBM AIX rpc.ypupdated privileges management [CVE-1999-0208]medium🔒--🔒
13718HP HP-UX vhe_u_mnt privileges management [CVE-1999-0325]medium🔒---
13717Sam Lantinga Splitvt memory corruption [CVE-1999-0316]medium🔒---
13716Slackware Linux mailx Command race condition [CVE-1999-0123]low🔒---
13715wu-ftpd site exec Command privileges management [CVE-1999-0080]medium🔒--🔒
13714Sun Solaris X Window improper authentication [CVE-1999-0241]high🔒---
13713Sun Solaris Syslog memory corruption [CVE-1999-0099]high🔒---
13712SGI IRIX Library Remote Code Execution [CVE-1999-0073]high🔒---
13711Livingston Postmaster denial of service [CVE-1999-0218]low🔒--🔒
13710Linux Kernel User improper authentication [CVE-1999-0245]low🔒---
13709Aladdin Enterprises Ghostscript ghostscript Command Local Privilege Escalationlow🔒---
13708Sun Solaris ps Command privileges management [CVE-1999-0164]medium🔒---
13707Sendmail privileges management [CVE-1999-1580]medium🔒---
13706Eric Allman Sendmail Mail From improper authentication [CVE-1999-0203]high🔒---
13705Matt Wright FormMail formmail.cgi privileges managementmedium🔒---
13704Cisco IOS Access Filter privileges management [CVE-1999-0161]medium🔒---
13703John S. Roberts AnyForm CGI privileges management [CVE-1999-0066]medium🔒--🔒
13702Sun Solaris Setuid File rmmount.conf privileges managementmedium🔒---
13701SATAN Security Scanner Session Key improper authentication [CVE-1999-0151]medium🔒---
13700SGI IRIX Desktop Permissions Tool privileges management [CVE-1999-1243]low🔒---
13699BSD Telnet Client missing encryption [CVE-1999-1098]medium🔒---
13698Slackware Linux POP3 privileges management [CVE-1999-0242]medium🔒---
13697NCSA Webserver memory corruption [CVE-1999-0235]high🔒---
13696NCSA Webserver memory corruption [CVE-1999-0232]high🔒---
13695Microsoft Windows TCP Sequence Number authentication spoofingmedium🔒--🔒

Do you want to use VulDB in your project?

Use the official API to access entries easily!