National Vulnerability Database

(308747)

CVE-1999-0187
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0022. Reason: This candidate is a duplicate of CVE-1999-0022. Notes: All CVE users should reference CVE-1999-0022 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage
CVE-1999-0186
In Solaris, an SNMP subagent has a default community string that allows remote attackers to execute arbitrary commands as root, or modify system parameters.
CVE-1999-0185
In SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command execution.
CVE-1999-0184
When compiled with the -DALLOW_UPDATES option, bind allows dynamic updates to the DNS server, allowing for malicious modification of DNS records.
CVE-1999-0183
Linux implementations of TFTP would allow access to files outside the restricted directory.
CVE-1999-0182
Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password.
CVE-1999-0181
The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands.
CVE-1999-0180
in.rshd allows users to login with a NULL username and execute commands.
CVE-1999-0179
Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share.
CVE-1999-0178
Buffer overflow in the win-c-sample program (win-c-sample.exe) in the WebSite web server 1.1e allows remote attackers to execute arbitrary code via a long query string.
  30857  
2013