Latest CVE Feed
-
7.5
HIGHCVE-1999-0528
A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0283
The Java Web Server would allow remote users to obtain the source code for CGI programs.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0268
MetaInfo MetaWeb web server allows users to upload, execute, and read scripts.... Read more
Affected Products : metaweb- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
7.5
HIGHCVE-1999-0240
Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0220
Attackers can do a denial of service of IRC by crashing the server.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0243
Linux cfingerd could be exploited to gain root access.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0664
An application-critical Windows NT registry key has inappropriate permissions.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
4.9
MEDIUMCVE-1999-0593
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.... Read more
Affected Products : windows_nt- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0662
A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0512
A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0547
An SSH server allows authentication through the .rhosts file.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-1999-0578
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.... Read more
Affected Products : windows_nt- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
0.0
NONE- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0559
A system-critical Unix file or directory has inappropriate permissions.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-1999-0384
The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content.... Read more
- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
5.0
MEDIUMCVE-1999-0650
The netstat service is running, which provides sensitive information to remote attackers.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-1999-0388
DataLynx suGuard trusts the PATH environment variable to execute the ps command, allowing local users to execute commands as root.... Read more
Affected Products : suguard- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0397
The demo version of the Quakenbush NT Password Appraiser sends passwords across the network in plaintext.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
4.6
MEDIUMCVE-1999-0398
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.... Read more
- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025
-
10.0
HIGHCVE-1999-0527
The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.... Read more
Affected Products :- Published: Jan. 01, 1999
- Modified: Apr. 03, 2025