Vulnerabilities > Medium
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
1999-01-02 | CVE-1999-0402 | Unspecified vulnerability in GNU Wget 1.5.3 wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself. | 5.0 |
1999-01-01 | CVE-1999-1440 | Unspecified vulnerability in Mirabilis ICQ 98A Win32 ICQ 98a 1.30, and possibly other versions, does not display the entire portion of long filenames, which could allow attackers to send an executable file with a long name that contains so many spaces that the .exe extension is not displayed, which could make the user believe that the file is safe to open from the client. | 5.1 |
1999-01-01 | CVE-1999-0656 | Configuration vulnerability in Linux Kernel The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names. | 5.0 |
1999-01-01 | CVE-1999-0650 | The netstat service is running, which provides sensitive information to remote attackers. network low complexity | 5.0 |
1999-01-01 | CVE-1999-0593 | Unspecified vulnerability in Microsoft Windows NT The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in. | 4.9 |
1999-01-01 | CVE-1999-0578 | Unspecified vulnerability in Microsoft Windows NT A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys. | 4.6 |
1999-01-01 | CVE-1999-0520 | A system-critical NETBIOS/SMB share has inappropriate access control. network low complexity | 6.4 |
1999-01-01 | CVE-1999-0453 | Information Exposure vulnerability in Cisco Router An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP). | 5.0 |
1999-01-01 | CVE-1999-0448 | Unspecified vulnerability in Microsoft Internet Information Server 4.0 IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request. | 5.0 |
1999-01-01 | CVE-1999-0398 | Unspecified vulnerability in SSH and Ssh2 In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login. | 4.6 |