Latest CVE Feed

Following is the list of latest published vulnerabilities. You can filter the list based on the severity of the vulnerability, whether it is actively exploited (also known as CISA KEV List) or remotely exploitable. You can also sort the list based on the published date, last updated date, or CVSS score.
  • 10.0

    HIGH
    CVE-1999-0596

    A Windows NT log file has an inappropriate maximum size or retention period.... Read more

    Affected Products :
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-0665

    An application-critical Windows NT registry key has an inappropriate value.... Read more

    Affected Products :
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-0454

    A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.... Read more

    Affected Products :
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-0569

    A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.... Read more

    Affected Products :
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-0663

    A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.... Read more

    Affected Products :
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-0601

    A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets.... Read more

    Affected Products :
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-0577

    A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.... Read more

    Affected Products : windows_nt
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 10.0

    HIGH
    CVE-1999-0452

    A service or application has a backdoor password that was placed there by the developer.... Read more

    Affected Products :
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-0231

    Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access.... Read more

    Affected Products : slmail
    • Published: Jan. 01, 1999
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-1999-1159

    SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root.... Read more

    Affected Products : ssh2
    • Published: Dec. 29, 1998
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1285

    Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed.... Read more

    Affected Products : linux_kernel
    • Published: Dec. 27, 1998
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-1999-1188

    mysqld in MySQL 3.21 creates log files with world-readable permissions, which allows local users to obtain passwords for users who are added to the user database.... Read more

    Affected Products : mysql
    • Published: Dec. 27, 1998
    • Modified: Apr. 03, 2025
  • 5.0

    MEDIUM
    CVE-1999-1281

    Development version of Breeze Network Server allows remote attackers to cause the system to reboot by accessing the configbreeze CGI program.... Read more

    Affected Products : breeze_network_server
    • Published: Dec. 26, 1998
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-1999-0968

    Buffer overflow in BNC IRC proxy allows remote attackers to gain privileges.... Read more

    Affected Products : bnc_irc
    • Published: Dec. 26, 1998
    • Modified: Apr. 03, 2025
  • 7.5

    HIGH
    CVE-1999-1278

    nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl.... Read more

    Affected Products : nlog
    • Published: Dec. 25, 1998
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-1999-1277

    BackWeb client stores the username and password in cleartext for proxy authentication in the Communication registry key, which could allow other local users to gain privileges by reading the password.... Read more

    Affected Products : backweb_client
    • Published: Dec. 24, 1998
    • Modified: Apr. 03, 2025
  • 2.1

    LOW
    CVE-1999-1173

    Corel Word Perfect 8 for Linux creates a temporary working directory with world-writable permissions, which allows local users to (1) modify Word Perfect behavior by modifying files in the working directory, or (2) modify files of other users via a symlin... Read more

    Affected Products : wordperfect
    • Published: Dec. 18, 1998
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-1999-0188

    The passwd command in Solaris can be subjected to a denial of service.... Read more

    Affected Products : solaris sunos
    • Published: Dec. 17, 1998
    • Modified: Apr. 03, 2025
  • 7.2

    HIGH
    CVE-1999-0139

    Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access.... Read more

    Affected Products : solaris sunos
    • Published: Dec. 12, 1998
    • Modified: Apr. 03, 2025
  • 4.6

    MEDIUM
    CVE-1999-1282

    RealSystem G2 server stores the administrator password in cleartext in a world-readable configuration file, which allows local users to gain privileges.... Read more

    Affected Products : realsystem_g2_server
    • Published: Dec. 10, 1998
    • Modified: Apr. 03, 2025
Showing 20 of 294848 Results