National Vulnerability Database
(308747)
- CVE-1999-0572
- .reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks.
- CVE-1999-0571
- A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts.
- CVE-1999-0570
- Windows NT is not using a password filter utility, e.g. PASSFILT.DLL.
- CVE-1999-0569
- A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file.
- CVE-1999-0568
- rpc.admind in Solaris is not running in a secure mode.
- CVE-1999-0566
- An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities.
- CVE-1999-0565
- A Sendmail alias allows input to be piped to a program.
- CVE-1999-0564
- An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled.
- CVE-1999-0562
- The registry in Windows NT can be accessed remotely by users who are not administrators.
- CVE-1999-0561
- IIS has the #exec function enabled for Server Side Include (SSI) files.