Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-01-01 | CVE-1999-0515 | An unrestricted remote trust relationship for Unix systems has been set up, e.g. network low complexity critical | 10.0 |
1999-01-01 | CVE-1999-0512 | A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers. network low complexity critical | 10.0 |
1999-01-01 | CVE-1999-0495 | A remote attacker can gain access to a file system using .. network low complexity critical | 10.0 |
1999-01-01 | CVE-1999-0465 | Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter. network low complexity critical | 10.0 |
1999-01-01 | CVE-1999-0454 | A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. network low complexity critical | 10.0 |
1999-01-01 | CVE-1999-0453 | Information Exposure vulnerability in Cisco Router An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP). | 5.0 |
1999-01-01 | CVE-1999-0452 | A service or application has a backdoor password that was placed there by the developer. network low complexity critical | 10.0 |
1999-01-01 | CVE-1999-0448 | Unspecified vulnerability in Microsoft Internet Information Server 4.0 IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request. | 5.0 |
1999-01-01 | CVE-1999-0401 | Unspecified vulnerability in Linux Kernel 2.2.1 A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files. | 3.7 |
1999-01-01 | CVE-1999-0399 | Unspecified vulnerability in Khaled Mardam-Bey Mirc 5.5 The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands. | 7.5 |