instruction
stringlengths 21
21
| input
stringlengths 40
40
| output
stringlengths 62
37.3k
|
---|---|---|
Explain CVE-1999-0618 | Explain the vulnerability: CVE-1999-0618 | The rexec service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0618'}]
CVE State: PUBLISHED |
Explain CVE-1999-0619 | Explain the vulnerability: CVE-1999-0619 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0620 | Explain the vulnerability: CVE-1999-0620 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0621 | Explain the vulnerability: CVE-1999-0621 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0622 | Explain the vulnerability: CVE-1999-0622 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0623 | Explain the vulnerability: CVE-1999-0623 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0624 | Explain the vulnerability: CVE-1999-0624 | The rstat/rstatd service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0624'}]
CVE State: PUBLISHED |
Explain CVE-1999-0625 | Explain the vulnerability: CVE-1999-0625 | The rpc.rquotad service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0625'}]
CVE State: PUBLISHED |
Explain CVE-1999-0626 | Explain the vulnerability: CVE-1999-0626 | A version of rusers is running that exposes valid user information to any entity on the network.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0626'}]
CVE State: PUBLISHED |
Explain CVE-1999-0627 | Explain the vulnerability: CVE-1999-0627 | The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627'}]
CVE State: PUBLISHED |
Explain CVE-1999-0628 | Explain the vulnerability: CVE-1999-0628 | The rwho/rwhod service is running, which exposes machine status and user information.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628'}]
CVE State: PUBLISHED |
Explain CVE-1999-0629 | Explain the vulnerability: CVE-1999-0629 | The ident/identd service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629'}]
CVE State: PUBLISHED |
Explain CVE-1999-0630 | Explain the vulnerability: CVE-1999-0630 | The NT Alerter and Messenger services are running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'http://support.microsoft.com/support/kb/articles/q189/2/71.asp'}]
CVE State: PUBLISHED |
Explain CVE-1999-0631 | Explain the vulnerability: CVE-1999-0631 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0632 | Explain the vulnerability: CVE-1999-0632 | The RPC portmapper service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0632'}]
CVE State: PUBLISHED |
Explain CVE-1999-0633 | Explain the vulnerability: CVE-1999-0633 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0634 | Explain the vulnerability: CVE-1999-0634 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0635 | Explain the vulnerability: CVE-1999-0635 | The echo service is running.
Affected Products: n/a
References: [{'name': '18514', 'tags': ['third-party-advisory', 'x_refsource_SECUNIA'], 'url': 'http://secunia.com/advisories/18514'}, {'name': '20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services', 'tags': ['mailing-list', 'x_refsource_FULLDISC'], 'url': 'http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html'}]
CVE State: PUBLISHED |
Explain CVE-1999-0636 | Explain the vulnerability: CVE-1999-0636 | The discard service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0636'}]
CVE State: PUBLISHED |
Explain CVE-1999-0637 | Explain the vulnerability: CVE-1999-0637 | The systat service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0637'}]
CVE State: PUBLISHED |
Explain CVE-1999-0638 | Explain the vulnerability: CVE-1999-0638 | The daytime service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0638'}]
CVE State: PUBLISHED |
Explain CVE-1999-0639 | Explain the vulnerability: CVE-1999-0639 | The chargen service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0639'}]
CVE State: PUBLISHED |
Explain CVE-1999-0640 | Explain the vulnerability: CVE-1999-0640 | The Gopher service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0640'}]
CVE State: PUBLISHED |
Explain CVE-1999-0641 | Explain the vulnerability: CVE-1999-0641 | The UUCP service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641'}]
CVE State: PUBLISHED |
Explain CVE-1999-0642 | Explain the vulnerability: CVE-1999-0642 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0643 | Explain the vulnerability: CVE-1999-0643 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0644 | Explain the vulnerability: CVE-1999-0644 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0645 | Explain the vulnerability: CVE-1999-0645 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0646 | Explain the vulnerability: CVE-1999-0646 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0647 | Explain the vulnerability: CVE-1999-0647 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0648 | Explain the vulnerability: CVE-1999-0648 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0649 | Explain the vulnerability: CVE-1999-0649 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0650 | Explain the vulnerability: CVE-1999-0650 | The netstat service is running, which provides sensitive information to remote attackers.
Affected Products: n/a
References: [{'name': 'netstat(72)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/72'}]
CVE State: PUBLISHED |
Explain CVE-1999-0651 | Explain the vulnerability: CVE-1999-0651 | The rsh/rlogin service is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/2995'}]
CVE State: PUBLISHED |
Explain CVE-1999-0652 | Explain the vulnerability: CVE-1999-0652 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0653 | Explain the vulnerability: CVE-1999-0653 | A component service related to NIS+ is running.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0653'}]
CVE State: PUBLISHED |
Explain CVE-1999-0654 | Explain the vulnerability: CVE-1999-0654 | The OS/2 or POSIX subsystem in NT is enabled.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0654'}]
CVE State: PUBLISHED |
Explain CVE-1999-0655 | Explain the vulnerability: CVE-1999-0655 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0656 | Explain the vulnerability: CVE-1999-0656 | The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
Affected Products: n/a
References: [{'name': 'linux-ugidd(348)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/348'}, {'tags': ['x_refsource_MISC'], 'url': 'http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638'}]
CVE State: PUBLISHED |
Explain CVE-1999-0657 | Explain the vulnerability: CVE-1999-0657 | WinGate is being used.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0657'}]
CVE State: PUBLISHED |
Explain CVE-1999-0658 | Explain the vulnerability: CVE-1999-0658 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0659 | Explain the vulnerability: CVE-1999-0659 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0660 | Explain the vulnerability: CVE-1999-0660 | N\A
Affected Products: N\A
References: N\A
CVE State: REJECTED |
Explain CVE-1999-0661 | Explain the vulnerability: CVE-1999-0661 | A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
Affected Products: n/a
References: [{'name': '20021009 Re: CERT Advisory CA-2002-28 Trojan Horse Sendmail', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://online.securityfocus.com/archive/1/294539'}, {'name': 'sendmail-backdoor(10313)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'http://www.iss.net/security_center/static/10313.php'}, {'name': '5921', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/5921'}, {'name': 'CA-1999-02', 'tags': ['third-party-advisory', 'x_refsource_CERT'], 'url': 'http://www.cert.org/advisories/CA-1999-02.html'}, {'name': '20020801 OpenSSH Security Advisory: Trojaned Distribution Files', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://marc.info/?l=bugtraq&m=102821663814127&w=2'}, {'name': 'CA-1994-14', 'tags': ['third-party-advisory', 'x_refsource_CERT'], 'url': 'http://www.cert.org/advisories/CA-1994-14.html'}, {'name': '20020801 trojan horse in recent openssh (version 3.4 portable 1)', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://marc.info/?l=bugtraq&m=102820843403741&w=2'}, {'name': 'CA-1999-01', 'tags': ['third-party-advisory', 'x_refsource_CERT'], 'url': 'http://www.cert.org/advisories/CA-1999-01.html'}, {'name': 'CA-1994-07', 'tags': ['third-party-advisory', 'x_refsource_CERT'], 'url': 'http://www.cert.org/advisories/CA-1994-07.html'}, {'name': 'CA-2002-28', 'tags': ['third-party-advisory', 'x_refsource_CERT'], 'url': 'http://www.cert.org/advisories/CA-2002-28.html'}]
CVE State: PUBLISHED |
Explain CVE-1999-0662 | Explain the vulnerability: CVE-1999-0662 | A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0662'}]
CVE State: PUBLISHED |
Explain CVE-1999-0663 | Explain the vulnerability: CVE-1999-0663 | A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0663'}]
CVE State: PUBLISHED |
Explain CVE-1999-0664 | Explain the vulnerability: CVE-1999-0664 | An application-critical Windows NT registry key has inappropriate permissions.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0664'}]
CVE State: PUBLISHED |
Explain CVE-1999-0665 | Explain the vulnerability: CVE-1999-0665 | An application-critical Windows NT registry key has an inappropriate value.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://www.cve.org/CVERecord?id=CVE-1999-0665'}]
CVE State: PUBLISHED |
Explain CVE-1999-0667 | Explain the vulnerability: CVE-1999-0667 | The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://marc.info/?l=bugtraq&m=87602880019797&w=2'}]
CVE State: PUBLISHED |
Explain CVE-1999-0668 | Explain the vulnerability: CVE-1999-0668 | The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
Affected Products: n/a
References: [{'name': 'J-064', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://ciac.llnl.gov/ciac/bulletins/j-064.shtml'}, {'name': 'MS99-032', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032'}, {'name': 'Q240308', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240308'}, {'name': '598', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/598'}]
CVE State: PUBLISHED |
Explain CVE-1999-0669 | Explain the vulnerability: CVE-1999-0669 | The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
Affected Products: n/a
References: [{'name': 'J-064', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://ciac.llnl.gov/ciac/bulletins/j-064.shtml'}]
CVE State: PUBLISHED |
Explain CVE-1999-0670 | Explain the vulnerability: CVE-1999-0670 | Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands.
Affected Products: n/a
References: [{'name': 'J-064', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://ciac.llnl.gov/ciac/bulletins/j-064.shtml'}, {'name': 'MS99-032', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032'}]
CVE State: PUBLISHED |
Explain CVE-1999-0671 | Explain the vulnerability: CVE-1999-0671 | Buffer overflow in ToxSoft NextFTP client through CWD command.
Affected Products: n/a
References: [{'name': '572', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/572'}]
CVE State: PUBLISHED |
Explain CVE-1999-0672 | Explain the vulnerability: CVE-1999-0672 | Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics.
Affected Products: n/a
References: [{'name': '573', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/573'}]
CVE State: PUBLISHED |
Explain CVE-1999-0673 | Explain the vulnerability: CVE-1999-0673 | Buffer overflow in ALMail32 POP3 client via From: or To: headers.
Affected Products: n/a
References: [{'name': '574', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/574'}]
CVE State: PUBLISHED |
Explain CVE-1999-0674 | Explain the vulnerability: CVE-1999-0674 | The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
Affected Products: n/a
References: [{'name': '570', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/570'}, {'name': 'J-067', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-067.shtml'}]
CVE State: PUBLISHED |
Explain CVE-1999-0675 | Explain the vulnerability: CVE-1999-0675 | Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host.
Affected Products: n/a
References: [{'name': '19990809 FW1 UDP Port 0 DoS', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://www.securityfocus.com/archive/1/23615'}, {'name': '576', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/576'}, {'name': '1038', 'tags': ['vdb-entry', 'x_refsource_OSVDB'], 'url': 'http://www.osvdb.org/1038'}]
CVE State: PUBLISHED |
Explain CVE-1999-0676 | Explain the vulnerability: CVE-1999-0676 | sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack.
Affected Products: n/a
References: [{'name': '575', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/575'}, {'name': '19990808 sdtcm_convert', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://www.securityfocus.com/templates/archive.pike?list=1&msg=19990809134220.A1191%40hades.chaoz.org'}]
CVE State: PUBLISHED |
Explain CVE-1999-0677 | Explain the vulnerability: CVE-1999-0677 | The WebRamp web administration utility has a default password.
Affected Products: n/a
References: [{'name': '577', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/577'}]
CVE State: PUBLISHED |
Explain CVE-1999-0678 | Explain the vulnerability: CVE-1999-0678 | A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
Affected Products: n/a
References: [{'name': '318', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/318'}]
CVE State: PUBLISHED |
Explain CVE-1999-0679 | Explain the vulnerability: CVE-1999-0679 | Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option.
Affected Products: n/a
References: [{'tags': ['x_refsource_CONFIRM'], 'url': 'http://www.efnet.org/archive/servers/hybrid/ChangeLog'}, {'name': '581', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/581'}]
CVE State: PUBLISHED |
Explain CVE-1999-0680 | Explain the vulnerability: CVE-1999-0680 | Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service.
Affected Products: n/a
References: [{'name': 'J-057', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-057.shtml'}, {'name': 'Q238600', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238600'}, {'name': 'MS99-028', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-028'}, {'name': '571', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/571'}]
CVE State: PUBLISHED |
Explain CVE-1999-0681 | Explain the vulnerability: CVE-1999-0681 | Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
Affected Products: n/a
References: [{'name': '19990807 Crash FrontPage Remotely...', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://archives.neohapsis.com/archives/bugtraq/1999-q3/0381.html'}, {'name': '568', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/568'}, {'name': 'frontpage-pws-dos(3117)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/3117'}]
CVE State: PUBLISHED |
Explain CVE-1999-0682 | Explain the vulnerability: CVE-1999-0682 | Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled.
Affected Products: n/a
References: [{'name': 'Q237927', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237927'}, {'name': 'J-056', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-056.shtml'}, {'name': '567', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/567'}, {'name': 'MS99-027', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-027'}]
CVE State: PUBLISHED |
Explain CVE-1999-0683 | Explain the vulnerability: CVE-1999-0683 | Denial of service in Gauntlet Firewall via a malformed ICMP packet.
Affected Products: n/a
References: [{'name': '1029', 'tags': ['vdb-entry', 'x_refsource_OSVDB'], 'url': 'http://www.osvdb.org/1029'}, {'name': '556', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/556'}]
CVE State: PUBLISHED |
Explain CVE-1999-0684 | Explain the vulnerability: CVE-1999-0684 | Denial of service in Sendmail 8.8.6 in HPUX.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0684'}]
CVE State: PUBLISHED |
Explain CVE-1999-0685 | Explain the vulnerability: CVE-1999-0685 | Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option.
Affected Products: n/a
References: [{'name': '618', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/618'}]
CVE State: PUBLISHED |
Explain CVE-1999-0686 | Explain the vulnerability: CVE-1999-0686 | Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL.
Affected Products: n/a
References: [{'name': 'J-046', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-046.shtml'}, {'name': 'HPSBUX9906-098', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-098'}]
CVE State: PUBLISHED |
Explain CVE-1999-0687 | Explain the vulnerability: CVE-1999-0687 | The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
Affected Products: n/a
References: [{'name': 'K-001', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/k-001.shtml'}, {'name': 'HPSBUX9909-103', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103'}, {'name': '00192', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192'}, {'name': '637', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/637'}]
CVE State: PUBLISHED |
Explain CVE-1999-0688 | Explain the vulnerability: CVE-1999-0688 | Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x.
Affected Products: n/a
References: [{'name': 'HPSBUX9907-101', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-101'}, {'name': '545', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/545'}]
CVE State: PUBLISHED |
Explain CVE-1999-0689 | Explain the vulnerability: CVE-1999-0689 | The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
Affected Products: n/a
References: [{'name': 'oval:org.mitre.oval:def:1880', 'tags': ['vdb-entry', 'signature', 'x_refsource_OVAL'], 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1880'}, {'name': 'HPSBUX9909-103', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103'}, {'name': '00192', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192'}, {'name': '636', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/636'}]
CVE State: PUBLISHED |
Explain CVE-1999-0690 | Explain the vulnerability: CVE-1999-0690 | HP CDE program includes the current directory in root's PATH variable.
Affected Products: n/a
References: [{'name': 'HPSBUX9907-100', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-100'}, {'name': 'J-053', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-053.shtml'}]
CVE State: PUBLISHED |
Explain CVE-1999-0691 | Explain the vulnerability: CVE-1999-0691 | Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
Affected Products: n/a
References: [{'name': 'oval:org.mitre.oval:def:3078', 'tags': ['vdb-entry', 'signature', 'x_refsource_OVAL'], 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3078'}, {'name': 'HPSBUX9909-103', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103'}, {'name': '00192', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192'}, {'name': '635', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/635'}]
CVE State: PUBLISHED |
Explain CVE-1999-0692 | Explain the vulnerability: CVE-1999-0692 | The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
Affected Products: n/a
References: [{'name': '19990701-01-P', 'tags': ['vendor-advisory', 'x_refsource_SGI'], 'url': 'ftp://patches.sgi.com/support/free/security/advisories/19990701-01-P'}, {'name': 'J-052', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-052.shtml'}]
CVE State: PUBLISHED |
Explain CVE-1999-0693 | Explain the vulnerability: CVE-1999-0693 | Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
Affected Products: n/a
References: [{'name': '641', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/641'}, {'name': 'HPSBUX9909-103', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103'}, {'name': '00192', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192'}, {'name': 'oval:org.mitre.oval:def:4374', 'tags': ['vdb-entry', 'signature', 'x_refsource_OVAL'], 'url': 'https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4374'}]
CVE State: PUBLISHED |
Explain CVE-1999-0694 | Explain the vulnerability: CVE-1999-0694 | Denial of service in AIX ptrace system call allows local users to crash the system.
Affected Products: n/a
References: [{'name': 'J-055', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-055.shtml'}]
CVE State: PUBLISHED |
Explain CVE-1999-0695 | Explain the vulnerability: CVE-1999-0695 | The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.
Affected Products: n/a
References: [{'name': '1064', 'tags': ['vdb-entry', 'x_refsource_OSVDB'], 'url': 'http://www.osvdb.org/1064'}, {'name': '620', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/620'}]
CVE State: PUBLISHED |
Explain CVE-1999-0696 | Explain the vulnerability: CVE-1999-0696 | Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
Affected Products: n/a
References: [{'name': '00188', 'tags': ['vendor-advisory', 'x_refsource_SUN'], 'url': 'http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188'}, {'name': 'J-051', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-051.shtml'}, {'name': 'HPSBUX9908-102', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102'}]
CVE State: PUBLISHED |
Explain CVE-1999-0697 | Explain the vulnerability: CVE-1999-0697 | SCO Doctor allows local users to gain root privileges through a Tools option.
Affected Products: n/a
References: [{'name': '621', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/621'}]
CVE State: PUBLISHED |
Explain CVE-1999-0698 | Explain the vulnerability: CVE-1999-0698 | Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0698'}]
CVE State: PUBLISHED |
Explain CVE-1999-0699 | Explain the vulnerability: CVE-1999-0699 | The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.
Affected Products: n/a
References: [{'name': '623', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/623'}]
CVE State: PUBLISHED |
Explain CVE-1999-0700 | Explain the vulnerability: CVE-1999-0700 | Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.
Affected Products: n/a
References: [{'name': 'MS99-026', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-026'}, {'name': 'Q237185', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237185'}]
CVE State: PUBLISHED |
Explain CVE-1999-0701 | Explain the vulnerability: CVE-1999-0701 | After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
Affected Products: n/a
References: [{'name': 'MS99-036', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036'}, {'name': '626', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/626'}, {'name': 'Q173039', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ173039'}]
CVE State: PUBLISHED |
Explain CVE-1999-0702 | Explain the vulnerability: CVE-1999-0702 | Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
Affected Products: n/a
References: [{'name': 'MS99-037', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037'}, {'name': '627', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/627'}, {'name': 'Q241361', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241361'}]
CVE State: PUBLISHED |
Explain CVE-1999-0703 | Explain the vulnerability: CVE-1999-0703 | OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices.
Affected Products: n/a
References: [{'name': 'J-066', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-066.shtml'}]
CVE State: PUBLISHED |
Explain CVE-1999-0704 | Explain the vulnerability: CVE-1999-0704 | Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
Affected Products: n/a
References: [{'name': '614', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/614'}]
CVE State: PUBLISHED |
Explain CVE-1999-0705 | Explain the vulnerability: CVE-1999-0705 | Buffer overflow in INN inews program.
Affected Products: n/a
References: [{'name': '616', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/616'}]
CVE State: PUBLISHED |
Explain CVE-1999-0706 | Explain the vulnerability: CVE-1999-0706 | Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
Affected Products: n/a
References: [{'name': '583', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/583'}]
CVE State: PUBLISHED |
Explain CVE-1999-0707 | Explain the vulnerability: CVE-1999-0707 | The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization.
Affected Products: n/a
References: [{'name': '493', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/493'}, {'name': 'J-050', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-050.shtml'}, {'name': 'HPSBUX9906-099', 'tags': ['vendor-advisory', 'x_refsource_HP'], 'url': 'http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-099'}]
CVE State: PUBLISHED |
Explain CVE-1999-0708 | Explain the vulnerability: CVE-1999-0708 | Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field.
Affected Products: n/a
References: [{'name': '651', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/651'}]
CVE State: PUBLISHED |
Explain CVE-1999-0710 | Explain the vulnerability: CVE-1999-0710 | The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
Affected Products: n/a
References: [{'name': 'FEDORA-2005-373', 'tags': ['vendor-advisory', 'x_refsource_FEDORA'], 'url': 'http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html'}, {'name': 'FLSA-2006:152809', 'tags': ['vendor-advisory', 'x_refsource_FEDORA'], 'url': 'http://fedoranews.org/updates/FEDORA--.shtml'}, {'name': 'RHSA-2005:489', 'tags': ['vendor-advisory', 'x_refsource_REDHAT'], 'url': 'http://www.redhat.com/support/errata/RHSA-2005-489.html'}, {'name': '2059', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/2059'}, {'name': 'DSA-576', 'tags': ['vendor-advisory', 'x_refsource_DEBIAN'], 'url': 'http://www.debian.org/security/2004/dsa-576'}, {'name': 'RHSA-1999:025', 'tags': ['vendor-advisory', 'x_refsource_REDHAT'], 'url': 'http://www.redhat.com/support/errata/RHSA-1999-025.html'}, {'name': 'http-cgi-cachemgr(2385)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/2385'}, {'tags': ['x_refsource_CONFIRM'], 'url': 'http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid'}]
CVE State: PUBLISHED |
Explain CVE-1999-0711 | Explain the vulnerability: CVE-1999-0711 | The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root.
Affected Products: n/a
References: [{'name': '19990430 *Huge* security hole in Oracle 8.0.5 with Intellegent agent installed', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://marc.info/?t=92550157100002&w=2&r=1'}, {'name': '19990506 Oracle Security Followup, patch and FAQ: setuid on oratclsh', 'tags': ['mailing-list', 'x_refsource_BUGTRAQ'], 'url': 'http://marc.info/?l=bugtraq&m=92609807906778&w=2'}]
CVE State: PUBLISHED |
Explain CVE-1999-0712 | Explain the vulnerability: CVE-1999-0712 | A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0712'}]
CVE State: PUBLISHED |
Explain CVE-1999-0713 | Explain the vulnerability: CVE-1999-0713 | The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.
Affected Products: n/a
References: [{'name': 'J-044', 'tags': ['third-party-advisory', 'government-resource', 'x_refsource_CIAC'], 'url': 'http://www.ciac.org/ciac/bulletins/j-044.shtml'}]
CVE State: PUBLISHED |
Explain CVE-1999-0714 | Explain the vulnerability: CVE-1999-0714 | Vulnerability in Compaq Tru64 UNIX edauth command.
Affected Products: n/a
References: [{'tags': ['x_refsource_MISC'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0714'}]
CVE State: PUBLISHED |
Explain CVE-1999-0715 | Explain the vulnerability: CVE-1999-0715 | Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.
Affected Products: n/a
References: [{'name': 'MS99-016', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-016'}, {'name': 'Q230677', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ230677'}]
CVE State: PUBLISHED |
Explain CVE-1999-0716 | Explain the vulnerability: CVE-1999-0716 | Buffer overflow in Windows NT 4.0 help file utility via a malformed help file.
Affected Products: n/a
References: [{'name': 'MS99-015', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-015'}, {'name': 'Q231605', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231605'}]
CVE State: PUBLISHED |
Explain CVE-1999-0717 | Explain the vulnerability: CVE-1999-0717 | A remote attacker can disable the virus warning mechanism in Microsoft Excel 97.
Affected Products: n/a
References: [{'name': 'MS99-014', 'tags': ['vendor-advisory', 'x_refsource_MS'], 'url': 'https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-014'}, {'name': 'Q231304', 'tags': ['vendor-advisory', 'x_refsource_MSKB'], 'url': 'http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231304'}]
CVE State: PUBLISHED |
Explain CVE-1999-0718 | Explain the vulnerability: CVE-1999-0718 | IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key.
Affected Products: n/a
References: [{'name': 'ibm-gina-group-add(3166)', 'tags': ['vdb-entry', 'x_refsource_XF'], 'url': 'https://exchange.xforce.ibmcloud.com/vulnerabilities/3166'}, {'name': '19990823 IBM Gina security warning', 'tags': ['mailing-list', 'x_refsource_NTBUGTRAQ'], 'url': 'http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9908&L=ntbugtraq&F=&S=&P=5534'}, {'name': '608', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/608'}]
CVE State: PUBLISHED |
Explain CVE-1999-0719 | Explain the vulnerability: CVE-1999-0719 | The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code.
Affected Products: n/a
References: [{'name': '563', 'tags': ['vdb-entry', 'x_refsource_BID'], 'url': 'http://www.securityfocus.com/bid/563'}]
CVE State: PUBLISHED |