Agents are becoming multi-channel. That means making them available wherever your users already are — including the inbox. Today, Cloudflare Email Service enters public beta with the infrastructure layer to make that easy: send, receive, and process email natively from your agents.
While enterprises breaches make more headlines, smaller incidents tend to be under-reported, if at all, allowing campaigns to last longer with less disruption.
A vulnerability was found in SGI IRIX 5.1/5.1.1/5.2/6.0/6.0.1. It has been classified as problematic. Affected is an unknown function of the component colorview. Performing a manipulation of the argument text results in information disclosure.
This vulnerability was named CVE-1999-1494. The attack needs to be approached locally. In addition, an exploit is available.
Upgrading the affected component is recommended.
A vulnerability was found in SGI IRIX 5.1/5.2. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file sgihelp of the component SGI Help System. Executing a manipulation can lead to improper privilege management.
The identification of this vulnerability is CVE-1999-1219. The attack can only be executed locally. Furthermore, there is an exploit available.
A vulnerability categorized as problematic has been discovered in SGI IRIX 4/5.2/5.3. This affects an unknown part of the component Serial Port Handler. The manipulation results in Local Privilege Escalation.
This vulnerability is identified as CVE-1999-1022. The attack is only possible with local access. Additionally, an exploit exists.
It is advisable to upgrade the affected component.
A vulnerability, which was classified as critical, was found in Microsoft Windows NT 4.0. Affected is an unknown function of the component TCP Sequence Number Handler. Such manipulation leads to authentication bypass by spoofing.
This vulnerability is traded as CVE-1999-0077. The attack may be launched remotely. Furthermore, there is an exploit available. This vulnerability is notable in history due to its background and the response it received.
You should upgrade the affected component.
A vulnerability categorized as problematic has been discovered in SATAN Security Scanner 1.0/1.1. Impacted is an unknown function of the component Session Key Handler. Such manipulation leads to improper authentication.
This vulnerability is referenced as CVE-1999-0151. It is possible to launch the attack remotely. No exploit is available. This vulnerability is historically impactful due to its background and the reception it garnered.
It is advisable to upgrade the affected component.
A vulnerability identified as problematic has been detected in Sun Solaris 2.5/2.5.1/7.0. The affected element is an unknown function of the file rmmount.conf of the component Setuid File Handler. Performing a manipulation results in improper privilege management.
This vulnerability is identified as CVE-1999-1080. The attack is only possible with local access. There is not any exploit available.
You should upgrade the affected component.
A vulnerability labeled as critical has been found in John S. Roberts AnyForm 1.0/2.0. The impacted element is an unknown function of the component CGI Handler. Executing a manipulation as part of Semicolon can lead to improper privilege management.
This vulnerability is tracked as CVE-1999-0066. The attack can be launched remotely. Moreover, an exploit is present.
The affected component should be upgraded.
A vulnerability marked as problematic has been reported in Cisco IOS 10.3. This affects an unknown function of the component Access Filter Handler. The manipulation with the input tacacs-ds/tacac leads to improper privilege management.
This vulnerability is listed as CVE-1999-0161. The attack may be initiated remotely. There is no available exploit.
It is suggested to upgrade the affected component.
A vulnerability described as critical has been identified in Matt Wright FormMail. This impacts an unknown function of the file formmail.cgi. The manipulation results in improper privilege management.
This vulnerability is cataloged as CVE-1999-0172. The attack may be launched remotely. There is no exploit available. This vulnerability has a historic impact due to its background and reception.
Upgrading the affected component is recommended.
A vulnerability classified as critical has been found in Eric Allman Sendmail 8.6.10. Affected is an unknown function of the component Mail From Handler. This manipulation causes improper authentication.
This vulnerability is registered as CVE-1999-0203. Remote exploitation of the attack is possible. No exploit is available. This vulnerability has a historic impact because of its background and how it was received.
It is recommended to upgrade the affected component.
A vulnerability classified as problematic was found in Sendmail 5.59/5.61/5.65. Affected by this vulnerability is an unknown functionality. Such manipulation of the argument -oR leads to improper privilege management.
This vulnerability is documented as CVE-1999-1580. The attack needs to be performed locally. There is not any exploit available. This vulnerability has historical importance owing to its background and reception.
Upgrading the affected component is advised.
A vulnerability classified as critical was found in DriveLock. This affects an unknown function. The manipulation results in path traversal.
This vulnerability is reported as CVE-2026-5492. The attack can be launched remotely. No exploit exists.
Upgrading the affected component is advised.
A vulnerability classified as critical has been found in DriveLock. The impacted element is an unknown function. The manipulation leads to path traversal.
This vulnerability is documented as CVE-2026-5491. The attack can be initiated remotely. There is not any exploit available.
It is recommended to upgrade the affected component.
A vulnerability described as critical has been identified in DriveLock. The affected element is an unknown function. Executing a manipulation can lead to sql injection.
This vulnerability is registered as CVE-2026-5490. It is possible to launch the attack remotely. No exploit is available.
Upgrading the affected component is recommended.
A vulnerability marked as critical has been reported in DriveLock. Impacted is an unknown function. Performing a manipulation results in path traversal.
This vulnerability is cataloged as CVE-2026-5487. It is possible to initiate the attack remotely. There is no exploit available.
It is suggested to upgrade the affected component.