CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Security Vulnerabilities (CVSS score between 9 and 10)

Press ESC to close
# CVE ID CWE ID # of Exploits Vulnerability Type(s) Publish Date Update Date Score Gained Access Level Access Complexity Authentication Conf. Integ. Avail.
101 CVE-1999-0569 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.
102 CVE-1999-0570 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
103 CVE-1999-0571 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts.
104 CVE-1999-0577 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories.
105 CVE-1999-0579 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys.
106 CVE-1999-0580 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions.
107 CVE-1999-0581 1999-01-01 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions.
108 CVE-1999-0583 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
There is a one-way or two-way trust relationship between Windows NT domains.
109 CVE-1999-0584 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT file system is not NTFS.
110 CVE-1999-0587 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data.
111 CVE-1999-0589 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A system-critical Windows NT registry key has inappropriate permissions.
112 CVE-1999-0590 2000-06-01 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
A system does not present an appropriate legal message or warning to a user who is accessing it.
113 CVE-1999-0591 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
An event log in Windows NT has inappropriate access permissions.
114 CVE-1999-0592 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The Logon box of a Windows NT system displays the name of the last user who logged in.
115 CVE-1999-0594 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive.
116 CVE-1999-0596 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT log file has an inappropriate maximum size or retention period.
117 CVE-1999-0597 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire.
118 CVE-1999-0598 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection.
119 CVE-1999-0599 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers.
120 CVE-1999-0600 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not verify the checksum on a packet.
121 CVE-1999-0601 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets.
122 CVE-1999-0602 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A network intrusion detection system (IDS) does not properly reassemble fragmented packets.
123 CVE-1999-0603 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc.
124 CVE-1999-0611 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A system-critical Windows NT registry key has an inappropriate value.
125 CVE-1999-0618 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The rexec service is running.
126 CVE-1999-0630 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The NT Alerter and Messenger services are running.
127 CVE-1999-0636 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The discard service is running.
128 CVE-1999-0640 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The Gopher service is running.
129 CVE-1999-0653 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A component service related to NIS+ is running.
130 CVE-1999-0654 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
The OS/2 or POSIX subsystem in NT is enabled.
131 CVE-1999-0661 1999-01-01 2016-10-17
10.0
None Remote Low Not required Complete Complete Complete
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
132 CVE-1999-0662 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
133 CVE-1999-0663 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
134 CVE-1999-0664 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
An application-critical Windows NT registry key has inappropriate permissions.
135 CVE-1999-0665 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
An application-critical Windows NT registry key has an inappropriate value.
136 CVE-1999-0667 DoS 1997-09-19 2008-09-09
10.0
None Remote Low Not required Complete Complete Complete
The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
137 CVE-1999-0692 +Priv 1999-07-19 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
138 CVE-1999-0696 Overflow 1999-07-01 2018-10-30
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
139 CVE-1999-0698 DoS 1999-01-01 2005-10-20
10.0
None Remote Low Not required Complete Complete Complete
Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux.
140 CVE-1999-0702 94 1999-09-10 2018-10-12
10.0
None Remote Low Not required Complete Complete Complete
Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
141 CVE-1999-0722 1999-08-08 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages.
142 CVE-1999-0730 1999-06-12 2008-09-05
10.0
None Remote Low Not required Complete Complete Complete
The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack.
143 CVE-1999-0741 1999-08-19 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
QMS CrownNet Unix Utilities for 2060 allows root to log on without a password.
144 CVE-1999-0745 Overflow 1999-08-18 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.
145 CVE-1999-0754 +Priv 1999-05-11 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
The INN inndstart program allows local users to gain privileges by specifying an alternate configuration file using the INNCONF environmental variable.
146 CVE-1999-0759 Overflow 1999-09-13 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in FuseMAIL POP service via long USER and PASS commands.
147 CVE-1999-0760 +Priv 2001-03-12 2017-10-09
10.0
Admin Remote Low Not required Complete Complete Complete
Undocumented ColdFusion Markup Language (CFML) tags and functions in the ColdFusion Administrator allow users to gain additional privileges.
148 CVE-1999-0765 1999-05-19 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor.
149 CVE-1999-0775 1999-06-10 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the "established" keyword in an access list.
150 CVE-1999-0789 Overflow 1999-09-28 2008-09-09
10.0
Admin Remote Low Not required Complete Complete Complete
Buffer overflow in AIX ftpd in the libc library.
CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.