CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
  Take a third party risk management course for FREE
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities Published In January 1999

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
51 CVE-1999-0600 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not verify the checksum on a packet.
52 CVE-1999-0599 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers.
53 CVE-1999-0598 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection.
54 CVE-1999-0597 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire.
55 CVE-1999-0596 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT log file has an inappropriate maximum size or retention period.
56 CVE-1999-0594 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive.
57 CVE-1999-0593 1999-01-01 2017-07-11
4.9
None Local Low Not required None None Complete
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
58 CVE-1999-0592 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The Logon box of a Windows NT system displays the name of the last user who logged in.
59 CVE-1999-0591 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
An event log in Windows NT has inappropriate access permissions.
60 CVE-1999-0589 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A system-critical Windows NT registry key has inappropriate permissions.
61 CVE-1999-0588 1999-01-01 2005-10-20
7.5
None Remote Low Not required Partial Partial Partial
A filter in a router or firewall allows unusual fragmented packets.
62 CVE-1999-0587 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.
63 CVE-1999-0586 1999-01-01 2014-11-04
0.0
None Remote Low Not required None None None
A network service is running on a nonstandard port.
64 CVE-1999-0584 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT file system is not NTFS.
65 CVE-1999-0583 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
There is a one-way or two-way trust relationship between Windows NT domains.
66 CVE-1999-0581 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
67 CVE-1999-0580 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.
68 CVE-1999-0579 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.
69 CVE-1999-0578 1999-01-01 2008-09-05
4.6
None Local Low Not required Partial Partial Partial
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
70 CVE-1999-0577 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
71 CVE-1999-0571 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts.
72 CVE-1999-0570 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
73 CVE-1999-0569 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.
74 CVE-1999-0568 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
rpc.admind in Solaris is not running in a secure mode.
75 CVE-1999-0565 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Sendmail alias allows input to be piped to a program.
76 CVE-1999-0564 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled.
77 CVE-1999-0561 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
IIS has the #exec function enabled for Server Side Include (SSI) files.
78 CVE-1999-0560 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
A system-critical Windows NT file or directory has inappropriate permissions.
79 CVE-1999-0559 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A system-critical Unix file or directory has inappropriate permissions.
80 CVE-1999-0556 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
Two or more Unix accounts have the same UID.
81 CVE-1999-0555 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Unix account with a name other than "root" has UID 0, i.e. root privileges.
82 CVE-1999-0554 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
NFS exports system-critical data to the world, e.g. / or a password file.
83 CVE-1999-0549 1999-01-01 2008-09-05
7.2
None Local Low Not required Complete Complete Complete
Windows NT automatically logs in an administrator upon rebooting.
84 CVE-1999-0548 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A superfluous NFS server is running, but it is not importing or exporting any file systems.
85 CVE-1999-0547 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
An SSH server allows authentication through the .rhosts file.
86 CVE-1999-0539 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A trust relationship exists between two Unix hosts.
87 CVE-1999-0530 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A system is operating in "promiscuous" mode which allows it to perform packet sniffing.
88 CVE-1999-0529 1999-01-01 2005-10-20
7.5
None Remote Low Not required Partial Partial Partial
A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc.
89 CVE-1999-0528 1999-01-01 2005-10-20
7.5
None Remote Low Not required Partial Partial Partial
A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.
90 CVE-1999-0527 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.
91 CVE-1999-0523 1999-01-01 2010-12-01
0.0
None Remote Low Not required None None None
ICMP echo (ping) is allowed from arbitrary hosts.
92 CVE-1999-0520 1999-01-01 2005-10-20
6.4
None Remote Low Not required Partial Partial None
A system-critical NETBIOS/SMB share has inappropriate access control.
93 CVE-1999-0515 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv.
94 CVE-1999-0512 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.
95 CVE-1999-0497 1999-01-01 2007-07-13
0.0
None Remote Low Not required None None None
Anonymous FTP is enabled.
96 CVE-1999-0495 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.
97 CVE-1999-0465 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.
98 CVE-1999-0464 DoS 1999-01-04 2016-10-18
2.1
None Local Low Not required None None Partial
Local users can perform a denial of service in Tripwire 1.2 and earlier using long filenames.
99 CVE-1999-0461 1999-01-28 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address.
100 CVE-1999-0458 1999-01-06 2008-09-09
2.1
None Local Low Not required Partial None None
L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
Total number of vulnerabilities : 153   Page : 1 2 (This Page)3 4
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.