Shodan
Maps
Images
Monitor
Developer
More...
Dashboard
View Api Docs
Vulnerabilities
By Date
Known Exploited
Advanced Search
Vulnerable Software
Vendors
Products
Nec:
Security Vulnerabilities
CVE-1999-1435
Buffer overflow in libsocks5 library of Socks 5 (socks5) 1.0r5 allows local users to gain privileges via long environmental variables.
CVSS Score
7.2
EPSS Score
0.001
Published
1998-07-10
CVE-1999-0009
Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases.
CVSS Score
10.0
EPSS Score
0.803
Published
1998-04-08
CVE-1999-0010
Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages.
CVSS Score
5.0
EPSS Score
0.02
Published
1998-04-08
CVE-1999-0011
Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer.
CVSS Score
5.4
EPSS Score
0.11
Published
1998-04-08
CVE-1999-0024
DNS cache poisoning via BIND, by predictable query IDs.
CVSS Score
5.0
EPSS Score
0.028
Published
1997-08-13
CVE-1999-0040
Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges.
CVSS Score
7.2
EPSS Score
0.002
Published
1997-05-01
CVE-1999-0868
ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN.
CVSS Score
7.2
EPSS Score
0.002
Published
1997-02-20
CVE-1999-0048
Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges.
CVSS Score
10.0
EPSS Score
0.019
Published
1997-01-27
CVE-1999-0043
Command execution via shell metachars in INN daemon (innd) 1.5 using "newgroup" and "rmgroup" control messages, and others.
CVSS Score
9.8
EPSS Score
0.016
Published
1996-12-04
CVE-1999-0138
The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access.
CVSS Score
7.2
EPSS Score
0.001
Published
1996-06-26
Prev
Next
Page 12
Products
Monitor
Search Engine
Developer API
Maps
Bulk Data
Images
Snippets
Pricing
Membership
API Subscriptions
Enterprise
Contact Us
support@shodan.io
Shodan ® - All rights reserved