CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In October 1999 (CVSS score >= 7)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
1 CVE-2000-0362 Overflow +Priv 1999-10-22 2008-09-10
7.2
None Local Low Not required Complete Complete Complete
Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges.
2 CVE-2000-0327 Exec Code 1999-10-21 2018-10-12
7.6
None Remote High Not required Complete Complete Complete
Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.
3 CVE-1999-1542 Exec Code 1999-10-04 2017-10-10
10.0
None Remote Low Not required Complete Complete Complete
RPMMail before 1.4 allows remote attackers to execute commands via an e-mail message with shell metacharacters in the "MAIL FROM" command.
4 CVE-1999-1541 Exec Code 1999-10-04 2017-12-19
7.2
None Local Low Not required Complete Complete Complete
shell-lock in Cactus Software Shell Lock allows local users to read or modify decoded shell files before they are executed, via a symlink attack on a temporary file.
5 CVE-1999-1523 DoS Exec Code Overflow 1999-10-04 2017-12-19
7.5
None Remote Low Not required Partial Partial Partial
Buffer overflow in Sambar Web Server 4.2.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP GET request.
6 CVE-1999-1357 XSS 1999-10-05 2016-10-18
7.5
None Remote Low Not required Partial Partial Partial
Netscape Communicator 4.04 through 4.7 (and possibly other versions) in various UNIX operating systems converts the 0x8b character to a "<" sign, and the 0x9b character to a ">" sign, which could allow remote attackers to attack other clients via cross-site scripting (CSS) in CGI programs that do not filter these characters.
7 CVE-1999-1346 1999-10-07 2016-10-18
7.5
None Remote Low Not required Partial Partial Partial
PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file.
8 CVE-1999-1344 1999-10-05 2016-10-18
7.5
None Remote Low Not required Partial Partial Partial
Auto_FTP.pl script in Auto_FTP 0.2 stores usernames and passwords in plaintext in the auto_ftp.conf configuration file.
9 CVE-1999-1047 Bypass 1999-10-18 2016-10-18
7.5
None Remote Low Not required Partial Partial Partial
When BSDI patches for Gauntlet 5.0 BSDI are installed in a particular order, Gauntlet allows remote attackers to bypass firewall access restrictions, and does not log the activities.
10 CVE-1999-0951 Exec Code Overflow 1999-10-22 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.
11 CVE-1999-0950 Overflow 1999-10-28 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.
12 CVE-1999-0944 1999-10-24 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.
13 CVE-1999-0943 Overflow +Priv 1999-10-15 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
Buffer overflow in OpenLink 3.2 allows remote attackers to gain privileges via a long GET request to the web configurator.
14 CVE-1999-0942 +Priv 1999-10-04 2008-09-09
7.2
None Local Low Not required Complete Complete Complete
UnixWare dos7utils allows a local user to gain root privileges by using the STATICMERGE environmental variable to find a script which it executes.
15 CVE-1999-0903 1999-10-26 2008-09-09
7.5
None Remote Low Not required Partial Partial Partial
genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.
16 CVE-1999-0902 1999-10-23 2008-09-09
7.2
None Local Low Not required Complete Complete Complete
ypserv allows local administrators to modify password tables.
17 CVE-1999-0901 1999-10-23 2008-09-09
7.2
None Local Low Not required Complete Complete Complete
ypserv allows a local user to modify the GECOS and login shells of other users.
18 CVE-1999-0900 Overflow +Priv 1999-10-23 2008-09-09
7.2
None Local Low Not required Complete Complete Complete
Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation.
19 CVE-1999-0895 1999-10-20 2008-09-09
7.5
None Remote Low Not required Partial Partial Partial
Firewall-1 does not properly restrict access to LDAP attributes.
20 CVE-1999-0883 1999-10-25 2018-05-03
10.0
None Remote Low Not required Complete Complete Complete
Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.
21 CVE-1999-0879 Overflow +Priv 1999-10-01 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file.
22 CVE-1999-0873 Overflow 1999-10-30 2008-09-09
7.5
None Remote Low Not required Partial Partial Partial
Buffer overflow in Skyfull mail server via MAIL FROM command.
23 CVE-1999-0791 1999-10-06 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
Hybrid Network cable modems do not include an authentication mechanism for administration, allowing remote attackers to compromise the system through the HSMP protocol.
24 CVE-1999-0766 16 Exec Code 1999-10-21 2021-07-23
9.3
None Remote Medium Not required Complete Complete Complete
The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.
Total number of vulnerabilities : 24   Page : 1 (This Page)
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.