Search
Total
201818 CVE
| CVE | Vendors | Products | Updated | CVSS v2 | CVSS v3 |
|---|---|---|---|---|---|
| CVE-1999-0243 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Linux cfingerd could be exploited to gain root access. | |||||
| CVE-1999-0255 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Buffer overflow in ircd allows arbitrary command execution. | |||||
| CVE-1999-0271 | 2005-10-20 | 5.0 MEDIUM | N/A | ||
| Progressive Networks Real Video server (pnserver) can be crashed remotely. | |||||
| CVE-1999-0286 | 2005-10-20 | 10.0 HIGH | N/A | ||
| In some NT web servers, appending a space at the end of a URL may allow attackers to read source code for active pages. | |||||
| CVE-1999-0361 | 2005-10-20 | 10.0 HIGH | N/A | ||
| NetWare version of LaserFiche stores usernames and passwords unencrypted, and allows administrative changes without logging. | |||||
| CVE-1999-0394 | 2005-10-20 | 10.0 HIGH | N/A | ||
| DPEC Online Courseware allows an attacker to change another user's password without knowing the original password. | |||||
| CVE-1999-0397 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The demo version of the Quakenbush NT Password Appraiser sends passwords across the network in plaintext. | |||||
| CVE-1999-0452 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A service or application has a backdoor password that was placed there by the developer. | |||||
| CVE-1999-0454 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. | |||||
| CVE-1999-0465 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter. | |||||
| CVE-1999-0492 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The ffingerd 1.19 allows remote attackers to identify users on the target system based on its responses. | |||||
| CVE-1999-0495 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares. | |||||
| CVE-1999-0512 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers. | |||||
| CVE-1999-0515 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv. | |||||
| CVE-1999-0520 | 2005-10-20 | 6.4 MEDIUM | N/A | ||
| A system-critical NETBIOS/SMB share has inappropriate access control. | |||||
| CVE-1999-0527 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten. | |||||
| CVE-1999-0528 | 2005-10-20 | 7.5 HIGH | N/A | ||
| A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of. | |||||
| CVE-1999-0529 | 2005-10-20 | 7.5 HIGH | N/A | ||
| A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc. | |||||
| CVE-1999-0530 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system is operating in "promiscuous" mode which allows it to perform packet sniffing. | |||||
| CVE-1999-0539 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A trust relationship exists between two Unix hosts. | |||||
| CVE-1999-0547 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An SSH server allows authentication through the .rhosts file. | |||||
| CVE-1999-0548 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A superfluous NFS server is running, but it is not importing or exporting any file systems. | |||||
| CVE-1999-0554 | 2005-10-20 | 10.0 HIGH | N/A | ||
| NFS exports system-critical data to the world, e.g. / or a password file. | |||||
| CVE-1999-0555 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Unix account with a name other than "root" has UID 0, i.e. root privileges. | |||||
| CVE-1999-0556 | 2005-10-20 | 10.0 HIGH | N/A | ||
| Two or more Unix accounts have the same UID. | |||||
| CVE-1999-0559 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical Unix file or directory has inappropriate permissions. | |||||
| CVE-1999-0561 | 2005-10-20 | 10.0 HIGH | N/A | ||
| IIS has the #exec function enabled for Server Side Include (SSI) files. | |||||
| CVE-1999-0564 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled. | |||||
| CVE-1999-0565 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Sendmail alias allows input to be piped to a program. | |||||
| CVE-1999-0569 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file. | |||||
| CVE-1999-0571 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts. | |||||
| CVE-1999-0580 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions. | |||||
| CVE-1999-0583 | 2005-10-20 | 10.0 HIGH | N/A | ||
| There is a one-way or two-way trust relationship between Windows NT domains. | |||||
| CVE-1999-0584 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT file system is not NTFS. | |||||
| CVE-1999-0587 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data. | |||||
| CVE-1999-0588 | 2005-10-20 | 7.5 HIGH | N/A | ||
| A filter in a router or firewall allows unusual fragmented packets. | |||||
| CVE-1999-0589 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical Windows NT registry key has inappropriate permissions. | |||||
| CVE-1999-0591 | 2005-10-20 | 10.0 HIGH | N/A | ||
| An event log in Windows NT has inappropriate access permissions. | |||||
| CVE-1999-0592 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The Logon box of a Windows NT system displays the name of the last user who logged in. | |||||
| CVE-1999-0594 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive. | |||||
| CVE-1999-0596 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT log file has an inappropriate maximum size or retention period. | |||||
| CVE-1999-0597 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire. | |||||
| CVE-1999-0598 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection. | |||||
| CVE-1999-0599 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers. | |||||
| CVE-1999-0600 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not verify the checksum on a packet. | |||||
| CVE-1999-0601 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets. | |||||
| CVE-1999-0602 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A network intrusion detection system (IDS) does not properly reassemble fragmented packets. | |||||
| CVE-1999-0603 | 2005-10-20 | 10.0 HIGH | N/A | ||
| In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc. | |||||
| CVE-1999-0611 | 2005-10-20 | 10.0 HIGH | N/A | ||
| A system-critical Windows NT registry key has an inappropriate value. | |||||
| CVE-1999-0618 | 2005-10-20 | 10.0 HIGH | N/A | ||
| The rexec service is running. | |||||
