CVE Database

Search and browse vulnerability records from NVD

Showing 50 of 176157 CVEs

CVE ID Severity Description EPSS Published
N/A

A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers.

0.5% 1999-01-01
N/A

A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection.

0.5% 1999-01-01
N/A

A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire.

1.3% 1999-01-01
N/A

A Windows NT log file has an inappropriate maximum size or retention period.

0.5% 1999-01-01
N/A

A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive.

0.5% 1999-01-01
N/A

The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in.

0.7% 1999-01-01
N/A

The Logon box of a Windows NT system displays the name of the last user who logged in.

0.5% 1999-01-01
N/A

An event log in Windows NT has inappropriate access permissions.

0.4% 1999-01-01
N/A

A system-critical Windows NT registry key has inappropriate permissions.

0.4% 1999-01-01
N/A

A filter in a router or firewall allows unusual fragmented packets.

0.5% 1999-01-01
N/A

A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.

0.5% 1999-01-01
N/A

A network service is running on a nonstandard port.

0.6% 1999-01-01
N/A

A Windows NT file system is not NTFS.

0.5% 1999-01-01
N/A

There is a one-way or two-way trust relationship between Windows NT domains.

0.5% 1999-01-01
N/A

The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.

4.0% 1999-01-01
N/A

The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.

0.4% 1999-01-01
N/A

A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.

13.4% 1999-01-01
N/A

A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys.

0.3% 1999-01-01
N/A

A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.

13.4% 1999-01-01
N/A

A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts.

0.5% 1999-01-01
N/A

Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.

9.0% 1999-01-01
N/A

A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.

0.5% 1999-01-01
N/A

rpc.admind in Solaris is not running in a secure mode.

0.5% 1999-01-01
N/A

A Sendmail alias allows input to be piped to a program.

0.5% 1999-01-01
N/A

An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled.

0.5% 1999-01-01
N/A

IIS has the #exec function enabled for Server Side Include (SSI) files.

0.9% 1999-01-01
N/A

A system-critical Windows NT file or directory has inappropriate permissions.

2.6% 1999-01-01
N/A

A system-critical Unix file or directory has inappropriate permissions.

0.4% 1999-01-01
N/A

Two or more Unix accounts have the same UID.

0.5% 1999-01-01
N/A

A Unix account with a name other than "root" has UID 0, i.e. root privileges.

0.5% 1999-01-01
N/A

NFS exports system-critical data to the world, e.g. / or a password file.

23.5% 1999-01-01
N/A

Windows NT automatically logs in an administrator upon rebooting.

0.4% 1999-01-01
N/A

A superfluous NFS server is running, but it is not importing or exporting any file systems.

0.2% 1999-01-01
N/A

An SSH server allows authentication through the .rhosts file.

0.4% 1999-01-01
N/A

A trust relationship exists between two Unix hosts.

0.5% 1999-01-01
N/A

A system is operating in "promiscuous" mode which allows it to perform packet sniffing.

0.5% 1999-01-01
N/A

A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc.

0.5% 1999-01-01
N/A

A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of.

0.5% 1999-01-01
N/A

The permissions for system-critical data in an anonymous FTP account are inappropriate. For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as "ls" can be overwritten.

0.4% 1999-01-01
N/A

ICMP echo (ping) is allowed from arbitrary hosts.

0.6% 1999-01-01
N/A

A system-critical NETBIOS/SMB share has inappropriate access control.

1.2% 1999-01-01
N/A

An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv.

0.5% 1999-01-01
N/A

A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers.

0.4% 1999-01-01
N/A

Anonymous FTP is enabled.

60.2% 1999-01-01
N/A

A remote attacker can gain access to a file system using .. (dot dot) when accessing SMB shares.

1.3% 1999-01-01
N/A

Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter.

1.3% 1999-01-01
N/A

A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.

1.2% 1999-01-01
N/A

An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).

0.6% 1999-01-01
N/A

A service or application has a backdoor password that was placed there by the developer.

0.5% 1999-01-01
N/A

IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.

61.9% 1999-01-01