U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Search Results (Refine Search)

Search Parameters:
There are 243,750 matching records.
Displaying matches 242,981 through 243,000.
Vuln ID Summary CVSS Severity
CVE-1999-0393

Remote attackers can cause a denial of service in Sendmail 8.8.x and 8.9.2 by sending messages with a large number of headers.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0394

DPEC Online Courseware allows an attacker to change another user's password without knowing the original password.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0395

A race condition in the BackWeb Polite Agent Protocol allows an attacker to spoof a BackWeb server.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 5.1 MEDIUM
CVE-1999-0397

The demo version of the Quakenbush NT Password Appraiser sends passwords across the network in plaintext.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0398

In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 4.6 MEDIUM
CVE-1999-0399

The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 7.5 HIGH
CVE-1999-0401

A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 3.7 LOW
CVE-1999-0448

IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0452

A service or application has a backdoor password that was placed there by the developer.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0453

An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 5.0 MEDIUM
CVE-1999-0454

A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0465

Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0495

A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0497

Anonymous FTP is enabled.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 0.0 LOW
CVE-1999-0512

A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0515

An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0520

A system-critical NETBIOS/SMB share has inappropriate access control.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 6.4 MEDIUM
CVE-1999-0523

ICMP echo (ping) is allowed from arbitrary hosts.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 0.0 LOW
CVE-1999-0527

The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 10.0 HIGH
CVE-1999-0528

A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.

Published: January 01, 1999; 12:00:00 AM -0500
V4.0:(not available)
V3.x:(not available)
V2.0: 7.5 HIGH