Search
Total
86024 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-1999-0255 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Buffer overflow in ircd allows arbitrary command execution. | |||||
| CVE-1999-0547 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An SSH server allows authentication through the .rhosts file. | |||||
| CVE-1999-0561 | 2005-10-20 | 10.0 HIGH | N/A | ||
| IIS has the #exec function enabled for Server Side Include (SSI) files. | |||||
| CVE-1999-0556 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Two or more Unix accounts have the same UID. | |||||
| CVE-2001-0291 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Buffer overflow in post-query sample CGI program allows remote attackers to execute arbitrary commands via an HTTP POST request that contains at least 10001 parameters. | |||||
| CVE-1999-0559 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical Unix file or directory has inappropriate permissions. | |||||
| CVE-1999-0361 | 2005-10-20 | 10.0 HIGH | N/A | ||
| NetWare version of LaserFiche stores usernames and passwords unencrypted, and allows administrative changes without logging. | |||||
| CVE-1999-0565 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Sendmail alias allows input to be piped to a program. | |||||
| CVE-1999-0539 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A trust relationship exists between two Unix hosts. | |||||
| CVE-1999-0121 | 2005-10-20 | 7.2 HIGH | N/A | ||
| Buffer overflow in dtaction command gives root access. | |||||
| CVE-1999-0512 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers. | |||||
| CVE-1999-0651 | 2005-10-20 | 7.5 HIGH | N/A | ||
| The rsh/rlogin service is running. | |||||
| CVE-1999-0662 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete. | |||||
| CVE-1999-0200 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password. | |||||
| CVE-1999-0944 | 2005-10-20 | 10.0 HIGH | N/A | ||
| IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections. | |||||
| CVE-1999-0271 | 2005-10-20 | 5.0 MEDIUM | N/A | ||
| Progressive Networks Real Video server (pnserver) can be crashed remotely. | |||||
| CVE-1999-0663 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified. | |||||
| CVE-1999-0584 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT file system is not NTFS. | |||||
| CVE-1999-0520 | 2005-10-20 | 6.4 MEDIUM | N/A | ||
| A system-critical NETBIOS/SMB share has inappropriate access control. | |||||
| CVE-1999-0664 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An application-critical Windows NT registry key has inappropriate permissions. | |||||
| CVE-1999-0452 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A service or application has a backdoor password that was placed there by the developer. | |||||
| CVE-1999-0583 | 2005-10-20 | 10.0 HIGH | N/A | ||
| There is a one-way or two-way trust relationship between Windows NT domains. | |||||
| CVE-1999-0564 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled. | |||||
| CVE-1999-0529 | 2005-10-20 | 7.5 HIGH | N/A | ||
| A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc. | |||||
| CVE-1999-0530 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system is operating in "promiscuous" mode which allows it to perform packet sniffing. | |||||
| CVE-1999-0588 | 2005-10-20 | 7.5 HIGH | N/A | ||
| A filter in a router or firewall allows unusual fragmented packets. | |||||
| CVE-1999-0465 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter. | |||||
| CVE-1999-0589 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical Windows NT registry key has inappropriate permissions. | |||||
| CVE-1999-0591 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An event log in Windows NT has inappropriate access permissions. | |||||
| CVE-1999-0592 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The Logon box of a Windows NT system displays the name of the last user who logged in. | |||||
| CVE-1999-0594 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive. | |||||
| CVE-1999-0596 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT log file has an inappropriate maximum size or retention period. | |||||
| CVE-1999-0597 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire. | |||||
| CVE-1999-0198 | 2005-10-20 | 10.0 HIGH | N/A | ||
| finger .@host on some systems may print information on some user accounts. | |||||
| CVE-1999-0598 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection. | |||||
| CVE-1999-0618 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The rexec service is running. | |||||
| CVE-1999-0636 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The discard service is running. | |||||
| CVE-1999-0527 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten. | |||||
| CVE-1999-0528 | 2005-10-20 | 7.5 HIGH | N/A | ||
| A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of. | |||||
| CVE-1999-0286 | 2005-10-20 | 10.0 HIGH | N/A | ||
| In some NT web servers, appending a space at the end of a URL may allow attackers to read source code for active pages. | |||||
| CVE-1999-0515 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv. | |||||
| CVE-1999-0197 | 2005-10-20 | 10.0 HIGH | N/A | ||
| finger 0@host on some systems may print information on some user accounts. | |||||
| CVE-1999-0600 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not verify the checksum on a packet. | |||||
| CVE-1999-0601 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets. | |||||
| CVE-1999-0603 | 2005-10-20 | 10.0 HIGH | N/A | ||
| In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc. | |||||
| CVE-1999-0611 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical Windows NT registry key has an inappropriate value. | |||||
| CVE-1999-0554 | 2005-10-20 | 10.0 HIGH | N/A | ||
| NFS exports system-critical data to the world, e.g. / or a password file. | |||||
| CVE-1999-0492 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The ffingerd 1.19 allows remote attackers to identify users on the target system based on its responses. | |||||
| CVE-1999-0571 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts. | |||||
| CVE-1999-0454 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. | |||||
