Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 2.1

    LOW
    CVE-1999-1362

    Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters.... Read more

    Affected Products : windows_nt
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-1999-1329

    Buffer overflow in SysVInit in Red Hat Linux 5.1 and earlier allows local users to gain privileges.... Read more

    Affected Products : linux
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-0154

    IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL.... Read more

    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-1999-1320

    Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing.... Read more

    Affected Products : netware
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-1999-1317

    Windows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the \?? object folder using a different case letter (upper or lower) to point to a different device.... Read more

    Affected Products : windows_nt
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1476

    A bug in Intel Pentium processor (MMX and Overdrive) allows local users to cause a denial of service (hang) in Intel-based operating systems such as Windows NT and Windows 95, via an invalid instruction, aka the "Invalid Operand with Locked CMPXCHG8B Inst... Read more

    Affected Products : pentium pentuim
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-2000-0013

    IRIX soundplayer program allows local users to gain privileges by including shell metacharacters in a .wav file, which is executed via the midikeys program.... Read more

    Affected Products : irix
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-1512

    The AMaViS virus scanner 0.2.0-pre4 and earlier allows remote attackers to execute arbitrary commands as root via an infected mail message with shell metacharacters in the reply-to field.... Read more

    Affected Products : virus_scanner
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1587

    /usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option.... Read more

    Affected Products : solaris sunos
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-1999-1465

    Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a log... Read more

    Affected Products : ios
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-1584

    Unknown vulnerability in (1) loadmodule, and (2) modload if modload is installed with setuid/setgid privileges, in SunOS 4.1.1 through 4.1.3c, and Open Windows 3.0, allows local users to gain root privileges via environment variables, a different vulnerab... Read more

    Affected Products : sunos openwindows
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-1444

    genkey utility in Alibaba 2.0 generates RSA key pairs with an exponent of 1, which results in transactions that are sent in cleartext.... Read more

    Affected Products : alibaba
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-1177

    Directory traversal vulnerability in nph-publish before 1.2 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the pathname for an upload operation.... Read more

    Affected Products : nph-publish
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-1451

    The Winmsdp.exe sample file in IIS 4.0 and Site Server 3.0 allows remote attackers to read arbitrary files.... Read more

    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-2000-0011

    Buffer overflow in AnalogX SimpleServer:WWW HTTP server allows remote attackers to execute commands via a long GET request.... Read more

    Affected Products : simpleserver_www
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1117

    lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.... Read more

    Affected Products : aix
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1126

    Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_d... Read more

    Affected Products : resource_manager
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-1999-1592

    Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129.... Read more

    Affected Products : sunos sendmail
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-1999-1382

    NetWare NFS mode 1 and 2 implements the "Read Only" flag in Unix by changing the ownership of a file to root, which allows local users to gain root privileges by creating a setuid program and setting it to "Read Only," which NetWare-NFS changes to a setui... Read more

    Affected Products : netware
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-1999-1087

    Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unau... Read more

    Affected Products : internet_explorer
    • Published: Dec. 31, 1999
    • Modified: Apr. 03, 2025
Showing 20 of 293640 Results