Vulnerabilities > Medium

DATE CVE VULNERABILITY TITLE RISK
1999-01-02 CVE-1999-0402 Unspecified vulnerability in GNU Wget 1.5.3
wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself.
network
low complexity
gnu
5.0
1999-01-01 CVE-1999-1440 Unspecified vulnerability in Mirabilis ICQ 98A
Win32 ICQ 98a 1.30, and possibly other versions, does not display the entire portion of long filenames, which could allow attackers to send an executable file with a long name that contains so many spaces that the .exe extension is not displayed, which could make the user believe that the file is safe to open from the client.
network
high complexity
mirabilis
5.1
1999-01-01 CVE-1999-0656 Configuration vulnerability in Linux Kernel
The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
network
low complexity
linux CWE-16
5.0
1999-01-01 CVE-1999-0650 The netstat service is running, which provides sensitive information to remote attackers.
network
low complexity
5.0
1999-01-01 CVE-1999-0593 Unspecified vulnerability in Microsoft Windows NT
The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.
local
low complexity
microsoft
4.9
1999-01-01 CVE-1999-0578 Unspecified vulnerability in Microsoft Windows NT
A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.
local
low complexity
microsoft
4.6
1999-01-01 CVE-1999-0520 A system-critical NETBIOS/SMB share has inappropriate access control.
network
low complexity
6.4
1999-01-01 CVE-1999-0453 Information Exposure vulnerability in Cisco Router
An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
network
low complexity
cisco CWE-200
5.0
1999-01-01 CVE-1999-0448 Unspecified vulnerability in Microsoft Internet Information Server 4.0
IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
network
low complexity
microsoft
5.0
1999-01-01 CVE-1999-0398 Unspecified vulnerability in SSH and Ssh2
In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login.
local
low complexity
ssh
4.6