CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 93710 CVEs

CVE ID Severity Description EPSS Published
N/A

IIS 3.0 allows remote attackers to cause a denial of service via a request to an ASP page in which the URL contains a large number of / (forward slash) characters.

15.5% 1999-12-31
N/A

Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.

9.6% 1999-12-31
N/A

SystemSoft SystemWizard package in HP Pavilion PC with Windows 98, and possibly other platforms and operating systems, installs two ActiveX controls that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via a malicious web page that references (1) the Launch control, or (2) the RegObj control.

1.6% 1999-12-31
N/A

Directory traversal vulnerability in nph-publish before 1.2 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the pathname for an upload operation.

1.0% 1999-12-31
N/A

Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048.

0.9% 1999-12-31
N/A

Cross-site scripting vulnerability in Third Voice Web annotation utility allows remote users to read sensitive data and generate fake web pages for other Third Voice users by injecting malicious Javascript into an annotation.

0.6% 1999-12-31
N/A

Tcpip.sys in Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface.

14.5% 1999-12-31
N/A

FTP service in IIS 4.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via many passive (PASV) connections at the same time.

18.1% 1999-12-31
N/A

Windows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs.

19.5% 1999-12-31
7.5 HIGH

Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the "Named Pipes Over RPC" vulnerability.

30.0% 1999-12-31
N/A

Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug.log, and (4) temporary files whose names begin with "DPR_".

0.1% 1999-12-31
N/A

HTTP Client application in ColdFusion allows remote attackers to bypass access restrictions for web pages on other ports by providing the target page to the mainframeset.cfm application, which requests the page from the server, making it look like the request is coming from the local host.

0.3% 1999-12-31
N/A

lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter.

0.4% 1999-12-31
N/A

Windows 95, when Remote Administration and File Sharing for NetWare Networks is enabled, creates a share (C$) when an administrator logs in remotely, which allows remote attackers to read arbitrary files by mapping the network drive.

48.7% 1999-12-31
N/A

Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enabled, which allows local users to gain privileges by decrypting the passwords.

0.6% 1999-12-31
N/A

lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times.

0.1% 1999-12-31
N/A

Cisco PIX Private Link 4.1.6 and earlier does not properly process certain commands in the configuration file, which reduces the effective key length of the DES key to 48 bits instead of 56 bits, which makes it easier for an attacker to find the proper key via a brute force attack.

0.5% 1999-12-31
N/A

Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue."

6.9% 1999-12-31
N/A

Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page.

6.3% 1999-12-31
N/A

Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server.

9.0% 1999-12-31
N/A

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.

0.5% 1999-12-31
N/A

Webmin before 0.5 does not restrict the number of invalid passwords that are entered for a valid username, which could allow remote attackers to gain privileges via brute force password cracking.

1.2% 1999-12-31
N/A

Microsoft Excel 97 does not warn the user before executing worksheet functions, which could allow attackers to execute arbitrary commands by using the CALL function to execute a malicious DLL, aka the Excel "CALL Vulnerability."

7.7% 1999-12-31
N/A

Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error).

6.5% 1999-12-31
N/A

Cisco Resource Manager (CRM) 1.0 and 1.1 creates world-readable log files and temporary files, which may expose sensitive information, to local users such as user IDs, passwords and SNMP community strings.

0.2% 1999-12-31
N/A

IIS 3.0 and 4.0 on x86 and Alpha allows remote attackers to cause a denial of service (hang) via a malformed GET request, aka the IIS "GET" vulnerability.

18.1% 1999-12-31
N/A

Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries.

17.1% 1999-12-31
N/A

Multiple buffer overflows in ISC DHCP Distribution server (dhcpd) 1.0 and 2.0 allow a remote attacker to cause a denial of service (crash) and possibly execute arbitrary commands via long options.

2.0% 1999-12-31
N/A

IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL.

48.2% 1999-12-31
N/A

nviboot boot script in the Debian nvi package allows local users to delete files via malformed entries in vi.recover.

0.1% 1999-12-30
N/A

Buffer overflow in CamShot WebCam HTTP server allows remote attackers to execute commands via a long GET request.

4.9% 1999-12-30
N/A

Buffer overflow in UnixWare rtpm program allows local users to gain privileges via a long environmental variable.

0.6% 1999-12-30
N/A

ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets.

1.0% 1999-12-30
N/A

The SMS Remote Control program is installed with insecure permissions, which allows local users to gain privileges by modifying or replacing the program.

1.0% 1999-12-29
N/A

Buffer overflow in CSM mail server allows remote attackers to cause a denial of service or execute commands via a long HELO command.

1.7% 1999-12-29
N/A

AltaVista search engine allows remote attackers to read files above the document root via a .. (dot dot) in the query.cgi CGI program.

3.6% 1999-12-29
N/A

The bna_pass program in Optivity NETarchitect uses the PATH environmental variable for finding the "rm" program, which allows local users to execute arbitrary commands.

0.3% 1999-12-29
N/A

Trend Micro PC-Cillin does not restrict access to its internal proxy port, allowing remote attackers to conduct a denial of service.

0.7% 1999-12-29
N/A

Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack.

0.5% 1999-12-28
N/A

Majordomo wrapper allows local users to gain privileges by specifying an alternate configuration file.

0.2% 1999-12-28
N/A

resend command in Majordomo allows local users to gain privileges via shell metacharacters.

0.3% 1999-12-28
N/A

Denial of service in Savant web server via a null character in the requested URL.

4.1% 1999-12-28
N/A

Multiple unknown vulnerabilities in the "r-cmnds" (1) remshd, (2) rexecd, (3) rlogind, (4) rlogin, (5) remsh, (6) rcp, (7) rexec, and (8) rdist for HP-UX 10.00 through 11.00 allow attackers to gain privileges or access files.

1.1% 1999-12-28
N/A

Buffer overflow in aVirt Rover POP3 server 1.1 allows remote attackers to cause a denial of service via a long user name.

1.0% 1999-12-27
N/A

InterScan VirusWall SMTP scanner does not properly scan messages with malformed attachments.

0.6% 1999-12-27
N/A

UnixWare pis and mkpis commands allow local users to gain privileges via a symlink attack.

0.1% 1999-12-27
N/A

IBM Network Station Manager NetStation allows local users to gain privileges via a symlink attack.

1.7% 1999-12-27
N/A

Buffer overflow in w3-msql CGI program in miniSQL package allows remote attackers to execute commands.

4.6% 1999-12-27
N/A

WebWho+ whois.cgi program allows remote attackers to execute commands via shell metacharacters in the TLD parameter.

5.3% 1999-12-26
N/A

FTPPro allows local users to read sensitive information, which is stored in plain text.

0.1% 1999-12-26