CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 93694 CVEs

CVE ID Severity Description EPSS Published
N/A

Ultimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to view the data if an error occurs when the HTTP server attempts to execute the file.

0.6% 1999-11-01
N/A

Buffer overflow in SCO UnixWare Xsco command via a long argument.

1.1% 1999-11-01
N/A

HP Secure Web Console uses weak encryption.

0.8% 1999-11-01
N/A

By default, Internet Explorer 5.0 and other versions enables the "Navigate sub-frames across different domains" option, which allows frame spoofing.

0.9% 1999-11-01
N/A

Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn't warn the user that the template contains executable content. Also applies to Outlook when the client views a malicious email message.

3.1% 1999-11-01
N/A

Buffer overflow in HHOpen ActiveX control (hhopen.ocx) 1.0.0.1 for Internet Explorer 4.01 and 5 allows remote attackers to execute arbitrary commands via long arguments to the OpenHelp method.

34.9% 1999-10-31
N/A

Buffer overflow in Skyfull mail server via MAIL FROM command.

3.0% 1999-10-30
N/A

Netscape Messaging Server 3.54, 3.55, and 3.6 allows a remote attacker to cause a denial of service (memory exhaustion) via a series of long RCPT TO commands.

7.1% 1999-10-29
N/A

Netscape Communicator 4.7 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long certificate key.

0.5% 1999-10-28
N/A

Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories.

5.1% 1999-10-28
N/A

URL Live! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

3.6% 1999-10-28
N/A

Falcon web server allows remote attackers to determine the absolute path of the web root via long file names.

0.6% 1999-10-28
N/A

LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo.

15.3% 1999-10-26
N/A

Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the "Log Out" option and selecting a "Cancel" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session.

0.1% 1999-10-26
N/A

genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767.

0.5% 1999-10-26
N/A

Falcon web server allows remote attackers to read arbitrary files via a .. (dot dot) attack.

0.6% 1999-10-26
N/A

The Zeus web server administrative interface uses weak encryption for its passwords.

0.4% 1999-10-25
N/A

Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine.

1.1% 1999-10-25
N/A

IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections.

2.1% 1999-10-24
N/A

ypserv allows local administrators to modify password tables.

0.2% 1999-10-23
N/A

ypserv allows a local user to modify the GECOS and login shells of other users.

0.2% 1999-10-23
N/A

Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation.

0.2% 1999-10-23
N/A

Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory.

0.1% 1999-10-22
N/A

Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges.

0.3% 1999-10-22
N/A

Linux kernel before 2.3.18 or 2.2.13pre15, with SLIP and PPP options, allows local unprivileged users to forge IP packets via the TIOCSETD option on tty devices.

0.1% 1999-10-22
N/A

Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands.

4.6% 1999-10-22
N/A

Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the "Virtual Machine Verifier" vulnerability.

8.8% 1999-10-21
N/A

Denial of service in Axent Raptor firewall via malformed zero-length IP options.

3.8% 1999-10-21
N/A

The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment.

6.5% 1999-10-21
N/A

Firewall-1 does not properly restrict access to LDAP attributes.

0.6% 1999-10-20
N/A

When BSDI patches for Gauntlet 5.0 BSDI are installed in a particular order, Gauntlet allows remote attackers to bypass firewall access restrictions, and does not log the activities.

0.4% 1999-10-18
N/A

ICQ ActiveList Server allows remote attackers to cause a denial of service (crash) via malformed packets to the server's UDP port.

1.0% 1999-10-17
N/A

Buffer overflow in OpenLink 3.2 allows remote attackers to gain privileges via a long GET request to the web configurator.

4.4% 1999-10-15
N/A

Pluggable Authentication Modules (PAM) in Red Hat Linux 6.1 does not properly lock access to disabled NIS accounts.

0.1% 1999-10-13
N/A

HTTP server for Xerox DocuColor 4 LP allows remote attackers to cause a denial of service (hang) via a long URL that contains a large number of . characters.

0.7% 1999-10-13
N/A

userOsa in SCO OpenServer allows local users to corrupt files via a symlink attack.

0.3% 1999-10-11
N/A

The IDENT server in Caldera Linux 2.3 creates multiple threads for each IDENT request, which allows remote attackers to cause a denial of service.

0.7% 1999-10-08
N/A

Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack.

5.0% 1999-10-08
N/A

Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a "......" (modified dot dot) attack.

3.1% 1999-10-08
N/A

Vulnerability in htmlparse.pike in Roxen Web Server 1.3.11 and earlier, possibly related to recursive parsing and referer tags in RXML.

0.6% 1999-10-07
N/A

Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm.

0.1% 1999-10-07
N/A

PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file.

0.5% 1999-10-07
N/A

NFS daemon (nfsd.exe) for Omni-NFS/X 6.1 allows remote attackers to cause a denial of service (resource exhaustion) via certain packets, possibly with the Urgent (URG) flag set, to port 111.

0.7% 1999-10-06
N/A

Hybrid Network cable modems do not include an authentication mechanism for administration, allowing remote attackers to compromise the system through the HSMP protocol.

6.7% 1999-10-06
N/A

Netscape Communicator 4.04 through 4.7 (and possibly other versions) in various UNIX operating systems converts the 0x8b character to a "<" sign, and the 0x9b character to a ">" sign, which could allow remote attackers to attack other clients via cross-site scripting (CSS) in CGI programs that do not filter these characters.

1.2% 1999-10-05
N/A

Auto_FTP.pl script in Auto_FTP 0.2 uses the /tmp/ftp_tmp as a shared directory with insecure permissions, which allows local users to (1) send arbitrary files to the remote server by placing them in the directory, and (2) view files that are being transferred.

0.1% 1999-10-05
N/A

Auto_FTP.pl script in Auto_FTP 0.2 stores usernames and passwords in plaintext in the auto_ftp.conf configuration file.

0.5% 1999-10-05
N/A

RPMMail before 1.4 allows remote attackers to execute commands via an e-mail message with shell metacharacters in the "MAIL FROM" command.

2.3% 1999-10-04
N/A

shell-lock in Cactus Software Shell Lock allows local users to read or modify decoded shell files before they are executed, via a symlink attack on a temporary file.

0.1% 1999-10-04
N/A

shell-lock in Cactus Software Shell Lock uses weak encryption (trivial encoding) which allows attackers to easily decrypt and obtain the source code.

0.1% 1999-10-04