Vulnerabilities
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-01-19 | CVE-1999-0119 | Unspecified vulnerability in Microsoft Windows NT 4.0 Windows NT 4.0 beta allows users to read and delete shares. | 10.0 |
1999-01-17 | CVE-1999-0678 | A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server. | 5.0 |
1999-01-17 | CVE-1999-0457 | Unspecified vulnerability in Debian Linux 1.3/1.3.1/2.0 Linux ftpwatch program allows local users to gain root privileges. | 7.2 |
1999-01-14 | CVE-1999-1538 | Remote Web-Based Administration vulnerability in Microsoft Internet Information Server 4.0 When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain access to sensitive server information, including the Administrator's password. | 2.1 |
1999-01-14 | CVE-1999-1376 | Unspecified vulnerability in Microsoft Internet Information Server 4.0 Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands. | 10.0 |
1999-01-14 | CVE-1999-1172 | Unspecified vulnerability in Maximizer Enterprise 4 By design, Maximizer Enterprise 4 calendar and address book program allows arbitrary users to modify the calendar of other users when the calendar is being shared. | 5.0 |
1999-01-11 | CVE-1999-0063 | Unspecified vulnerability in Cisco IOS Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. | 5.0 |
1999-01-10 | CVE-1999-0392 | Unspecified vulnerability in Thomas Boutell Cgic Library Buffer overflow in Thomas Boutell's cgic library version up to 1.05. | 5.0 |
1999-01-07 | CVE-1999-0442 | Unspecified vulnerability in SUN Solaris and Sunos Solaris ff.core allows local users to modify files. | 2.1 |
1999-01-06 | CVE-1999-1268 | Unspecified vulnerability in KDE Vulnerability in KDE konsole allows local users to hijack or observe sessions of other users by accessing certain devices. | 7.2 |