Логотип exploitDog
source:"nvd"
Консоль
Логотип exploitDog

exploitDog

source:"nvd"

Количество 306 740

Количество 306 740

nvd логотип

CVE-1999-1099

почти 29 лет назад

Kerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-1999-1098

больше 30 лет назад

Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-1999-1097

больше 26 лет назад

Microsoft NetMeeting 2.1 allows one client to read the contents of another client's clipboard via a CTRL-C in the chat box when the box is empty.

CVSS2: 6.4
EPSS: Средний
nvd логотип

CVE-1999-1096

больше 27 лет назад

Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-1999-1095

почти 28 лет назад

sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-1999-1094

больше 25 лет назад

Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue."

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-1999-1093

больше 25 лет назад

Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page.

CVSS2: 5.1
EPSS: Низкий
nvd логотип

CVE-1999-1092

почти 26 лет назад

tin 1.40 creates the .tin directory with insecure permissions, which allows local users to read passwords from the .inputhistory file.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-1999-1091

больше 23 лет назад

UNIX news readers tin and rtin create the /tmp/.tin_log file with insecure permissions and follow symlinks, which allows attackers to modify the permissions of files writable by the user via a symlink attack.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-1999-1090

почти 34 года назад

The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files.

CVSS2: 7.5
EPSS: Низкий
nvd логотип

CVE-1999-1089

больше 28 лет назад

Buffer overflow in chfn command in HP-UX 9.X through 10.20 allows local users to gain privileges via a long command line argument.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-1999-1088

больше 28 лет назад

Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.

CVSS2: 7.2
EPSS: Низкий
nvd логотип

CVE-1999-1087

больше 25 лет назад

Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server.

CVSS2: 7.5
EPSS: Средний
nvd логотип

CVE-1999-1086

около 26 лет назад

Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.

CVSS2: 10
EPSS: Низкий
nvd логотип

CVE-1999-1085

около 27 лет назад

SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote attackers to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and computing a valid CRC-32 checksum for the packet, aka the "SSH insertion attack."

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-1999-1084

больше 25 лет назад

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.

CVSS2: 4.6
EPSS: Низкий
nvd логотип

CVE-1999-1083

почти 26 лет назад

Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-1999-1082

почти 26 лет назад

Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a "......" (modified dot dot) attack.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-1999-1081

больше 23 лет назад

Vulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files.

CVSS2: 5
EPSS: Низкий
nvd логотип

CVE-1999-1080

больше 30 лет назад

rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf.

CVSS2: 7.2
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-1999-1099

Kerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user.

CVSS2: 5
1%
Низкий
почти 29 лет назад
nvd логотип
CVE-1999-1098

Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing.

CVSS2: 5
2%
Низкий
больше 30 лет назад
nvd логотип
CVE-1999-1097

Microsoft NetMeeting 2.1 allows one client to read the contents of another client's clipboard via a CTRL-C in the chat box when the box is empty.

CVSS2: 6.4
17%
Средний
больше 26 лет назад
nvd логотип
CVE-1999-1096

Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable.

CVSS2: 7.2
0%
Низкий
больше 27 лет назад
nvd логотип
CVE-1999-1095

sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort.

CVSS2: 7.2
0%
Низкий
почти 28 лет назад
nvd логотип
CVE-1999-1094

Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the "mk:" protocol, aka the "MK Overrun security issue."

CVSS2: 7.5
7%
Низкий
больше 25 лет назад
nvd логотип
CVE-1999-1093

Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page.

CVSS2: 5.1
6%
Низкий
больше 25 лет назад
nvd логотип
CVE-1999-1092

tin 1.40 creates the .tin directory with insecure permissions, which allows local users to read passwords from the .inputhistory file.

CVSS2: 4.6
0%
Низкий
почти 26 лет назад
nvd логотип
CVE-1999-1091

UNIX news readers tin and rtin create the /tmp/.tin_log file with insecure permissions and follow symlinks, which allows attackers to modify the permissions of files writable by the user via a symlink attack.

CVSS2: 5
1%
Низкий
больше 23 лет назад
nvd логотип
CVE-1999-1090

The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an "ftp=yes" line, which allows remote attackers to read and modify arbitrary files.

CVSS2: 7.5
1%
Низкий
почти 34 года назад
nvd логотип
CVE-1999-1089

Buffer overflow in chfn command in HP-UX 9.X through 10.20 allows local users to gain privileges via a long command line argument.

CVSS2: 7.2
0%
Низкий
больше 28 лет назад
nvd логотип
CVE-1999-1088

Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges.

CVSS2: 7.2
0%
Низкий
больше 28 лет назад
nvd логотип
CVE-1999-1087

Internet Explorer 4 treats a 32-bit number ("dotless IP address") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server.

CVSS2: 7.5
10%
Средний
больше 25 лет назад
nvd логотип
CVE-1999-1086

Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls.

CVSS2: 10
1%
Низкий
около 26 лет назад
nvd логотип
CVE-1999-1085

SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote attackers to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and computing a valid CRC-32 checksum for the packet, aka the "SSH insertion attack."

CVSS2: 5
3%
Низкий
около 27 лет назад
nvd логотип
CVE-1999-1084

The "AEDebug" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash.

CVSS2: 4.6
1%
Низкий
больше 25 лет назад
nvd логотип
CVE-1999-1083

Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack.

CVSS2: 5
5%
Низкий
почти 26 лет назад
nvd логотип
CVE-1999-1082

Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a "......" (modified dot dot) attack.

CVSS2: 5
3%
Низкий
почти 26 лет назад
nvd логотип
CVE-1999-1081

Vulnerability in files.pl script in Novell WebServer Examples Toolkit 2 allows remote attackers to read arbitrary files.

CVSS2: 5
2%
Низкий
больше 23 лет назад
nvd логотип
CVE-1999-1080

rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf.

CVSS2: 7.2
0%
Низкий
больше 30 лет назад

Уязвимостей на страницу