instruction
stringlengths 26
107
| input
stringclasses 1
value | output
stringlengths 12
264k
|
---|---|---|
How can CVE CVE-1999-0425 be exploited? | talkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0425",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0425",
"indicator": "CVE-1999-0425",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0425",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "6.4",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.4,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 4.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:netscape:communicator:4.5"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425"
}
],
"description": "talkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-18T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0426 and related exploits. | The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0426",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0426",
"indicator": "CVE-1999-0426",
"type_title": "CVE",
"base_indicator": {
"id": 2199208283,
"indicator": "CVE-1999-0426",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0426",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-276",
"products": [
"cpe:2.3:o:suse:suse_linux:6.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426",
"type": null,
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426",
"type": null,
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426"
}
],
"description": "The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0426. | The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0426",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0426",
"indicator": "CVE-1999-0426",
"type_title": "CVE",
"base_indicator": {
"id": 2199208283,
"indicator": "CVE-1999-0426",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0426",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-276",
"products": [
"cpe:2.3:o:suse:suse_linux:6.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426",
"type": null,
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426",
"type": null,
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426"
}
],
"description": "The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0426 be exploited? | The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0426",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0426",
"indicator": "CVE-1999-0426",
"type_title": "CVE",
"base_indicator": {
"id": 2199208283,
"indicator": "CVE-1999-0426",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0426",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-276",
"products": [
"cpe:2.3:o:suse:suse_linux:6.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426",
"type": null,
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426",
"type": null,
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426"
}
],
"description": "The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0427 and related exploits. | Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0427",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0427",
"indicator": "CVE-1999-0427",
"type_title": "CVE",
"base_indicator": {
"id": 2199217787,
"indicator": "CVE-1999-0427",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0427",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:qualcomm:eudora:4.3",
"cpe:2.3:a:qualcomm:eudora:4.2",
"cpe:2.3:a:qualcomm:eudora_pro:1.00",
"cpe:2.3:a:qualcomm:eudora_light:3.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
}
],
"description": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "2000-05-01T04:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0427. | Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0427",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0427",
"indicator": "CVE-1999-0427",
"type_title": "CVE",
"base_indicator": {
"id": 2199217787,
"indicator": "CVE-1999-0427",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0427",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:qualcomm:eudora:4.3",
"cpe:2.3:a:qualcomm:eudora:4.2",
"cpe:2.3:a:qualcomm:eudora_pro:1.00",
"cpe:2.3:a:qualcomm:eudora_light:3.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
}
],
"description": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "2000-05-01T04:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0427 be exploited? | Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0427",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0427",
"indicator": "CVE-1999-0427",
"type_title": "CVE",
"base_indicator": {
"id": 2199217787,
"indicator": "CVE-1999-0427",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0427",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:qualcomm:eudora:4.3",
"cpe:2.3:a:qualcomm:eudora:4.2",
"cpe:2.3:a:qualcomm:eudora_pro:1.00",
"cpe:2.3:a:qualcomm:eudora_light:3.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427"
}
],
"description": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "2000-05-01T04:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0428 and related exploits. | OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0428",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0428",
"indicator": "CVE-1999-0428",
"type_title": "CVE",
"base_indicator": {
"id": 2199234211,
"indicator": "CVE-1999-0428",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0428",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.9.2b",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-384",
"products": [
"cpe:2.3:a:openssl:openssl"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/3936",
"type": null,
"tags": [
"Broken Link"
],
"name": "3936"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3936",
"type": null,
"tags": [
"Broken Link"
],
"name": "3936"
}
],
"description": "OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-22T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0428. | OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0428",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0428",
"indicator": "CVE-1999-0428",
"type_title": "CVE",
"base_indicator": {
"id": 2199234211,
"indicator": "CVE-1999-0428",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0428",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.9.2b",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-384",
"products": [
"cpe:2.3:a:openssl:openssl"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/3936",
"type": null,
"tags": [
"Broken Link"
],
"name": "3936"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3936",
"type": null,
"tags": [
"Broken Link"
],
"name": "3936"
}
],
"description": "OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-22T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0428 be exploited? | OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0428",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0428",
"indicator": "CVE-1999-0428",
"type_title": "CVE",
"base_indicator": {
"id": 2199234211,
"indicator": "CVE-1999-0428",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0428",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "0.9.2b",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-384",
"products": [
"cpe:2.3:a:openssl:openssl"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/3936",
"type": null,
"tags": [
"Broken Link"
],
"name": "3936"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3936",
"type": null,
"tags": [
"Broken Link"
],
"name": "3936"
}
],
"description": "OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-22T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0429 and related exploits. | The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0429",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0429",
"indicator": "CVE-1999-0429",
"type_title": "CVE",
"base_indicator": {
"id": 2199205799,
"indicator": "CVE-1999-0429",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0429",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:ibm:lotus_notes:4.5"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2",
"type": null,
"tags": [],
"name": "19990323"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2",
"type": null,
"tags": [],
"name": "19990323"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2",
"type": null,
"tags": [],
"name": "19990324 Re: LNotes encryption"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2",
"type": null,
"tags": [],
"name": "19990324 Re: LNotes encryption"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2",
"type": null,
"tags": [],
"name": "19990326 Lotus Notes Encryption Bug"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2",
"type": null,
"tags": [],
"name": "19990326 Lotus Notes Encryption Bug"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2",
"type": null,
"tags": [],
"name": "19990326 Re: Lotus Notes security advisory"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2",
"type": null,
"tags": [],
"name": "19990326 Re: Lotus Notes security advisory"
}
],
"description": "The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the \"Encrypt Saved Mail\" preference.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0429. | The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0429",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0429",
"indicator": "CVE-1999-0429",
"type_title": "CVE",
"base_indicator": {
"id": 2199205799,
"indicator": "CVE-1999-0429",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0429",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:ibm:lotus_notes:4.5"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2",
"type": null,
"tags": [],
"name": "19990323"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2",
"type": null,
"tags": [],
"name": "19990323"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2",
"type": null,
"tags": [],
"name": "19990324 Re: LNotes encryption"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2",
"type": null,
"tags": [],
"name": "19990324 Re: LNotes encryption"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2",
"type": null,
"tags": [],
"name": "19990326 Lotus Notes Encryption Bug"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2",
"type": null,
"tags": [],
"name": "19990326 Lotus Notes Encryption Bug"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2",
"type": null,
"tags": [],
"name": "19990326 Re: Lotus Notes security advisory"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2",
"type": null,
"tags": [],
"name": "19990326 Re: Lotus Notes security advisory"
}
],
"description": "The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the \"Encrypt Saved Mail\" preference.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0429 be exploited? | The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0429",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0429",
"indicator": "CVE-1999-0429",
"type_title": "CVE",
"base_indicator": {
"id": 2199205799,
"indicator": "CVE-1999-0429",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0429",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:ibm:lotus_notes:4.5"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2",
"type": null,
"tags": [],
"name": "19990323"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2",
"type": null,
"tags": [],
"name": "19990323"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2",
"type": null,
"tags": [],
"name": "19990324 Re: LNotes encryption"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2",
"type": null,
"tags": [],
"name": "19990324 Re: LNotes encryption"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2",
"type": null,
"tags": [],
"name": "19990326 Lotus Notes Encryption Bug"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2",
"type": null,
"tags": [],
"name": "19990326 Lotus Notes Encryption Bug"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2",
"type": null,
"tags": [],
"name": "19990326 Re: Lotus Notes security advisory"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2",
"type": null,
"tags": [],
"name": "19990326 Re: Lotus Notes security advisory"
}
],
"description": "The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the \"Encrypt Saved Mail\" preference.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0430 and related exploits. | Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0430",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0430",
"indicator": "CVE-1999-0430",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0430",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502",
"cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/1103",
"type": null,
"tags": [],
"name": "1103"
},
{
"external_source": "",
"href": "http://www.osvdb.org/1103",
"type": null,
"tags": [],
"name": "1103"
}
],
"description": "Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0430. | Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0430",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0430",
"indicator": "CVE-1999-0430",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0430",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502",
"cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/1103",
"type": null,
"tags": [],
"name": "1103"
},
{
"external_source": "",
"href": "http://www.osvdb.org/1103",
"type": null,
"tags": [],
"name": "1103"
}
],
"description": "Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0430 be exploited? | Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0430",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0430",
"indicator": "CVE-1999-0430",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0430",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501",
"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502",
"cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29",
"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/1103",
"type": null,
"tags": [],
"name": "1103"
},
{
"external_source": "",
"href": "http://www.osvdb.org/1103",
"type": null,
"tags": [],
"name": "1103"
}
],
"description": "Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0431 and related exploits. | Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0431",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0431",
"indicator": "CVE-1999-0431",
"type_title": "CVE",
"base_indicator": {
"id": 3843191298,
"indicator": "CVE-1999-0431",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0431",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.2.3",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:linux:linux_kernel:2.2.10",
"cpe:2.3:o:linux:linux_kernel:2.2.13",
"cpe:2.3:o:linux:linux_kernel:2.2.0",
"cpe:2.3:o:linux:linux_kernel:2.2.15:pre16",
"cpe:2.3:o:linux:linux_kernel:2.2.16",
"cpe:2.3:o:linux:linux_kernel:2.2.12",
"cpe:2.3:o:linux:linux_kernel:2.1.89",
"cpe:2.3:o:linux:linux_kernel:2.2.15_pre20",
"cpe:2.3:o:linux:linux_kernel:2.2.15",
"cpe:2.3:o:linux:linux_kernel:2.2.14",
"cpe:2.3:o:linux:linux_kernel:2.2.16:pre6",
"cpe:2.3:o:linux:linux_kernel"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
}
],
"description": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0431. | Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0431",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0431",
"indicator": "CVE-1999-0431",
"type_title": "CVE",
"base_indicator": {
"id": 3843191298,
"indicator": "CVE-1999-0431",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0431",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.2.3",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:linux:linux_kernel:2.2.10",
"cpe:2.3:o:linux:linux_kernel:2.2.13",
"cpe:2.3:o:linux:linux_kernel:2.2.0",
"cpe:2.3:o:linux:linux_kernel:2.2.15:pre16",
"cpe:2.3:o:linux:linux_kernel:2.2.16",
"cpe:2.3:o:linux:linux_kernel:2.2.12",
"cpe:2.3:o:linux:linux_kernel:2.1.89",
"cpe:2.3:o:linux:linux_kernel:2.2.15_pre20",
"cpe:2.3:o:linux:linux_kernel:2.2.15",
"cpe:2.3:o:linux:linux_kernel:2.2.14",
"cpe:2.3:o:linux:linux_kernel:2.2.16:pre6",
"cpe:2.3:o:linux:linux_kernel"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
}
],
"description": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0431 be exploited? | Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0431",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0431",
"indicator": "CVE-1999-0431",
"type_title": "CVE",
"base_indicator": {
"id": 3843191298,
"indicator": "CVE-1999-0431",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0431",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "2.2.3",
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:linux:linux_kernel:2.2.10",
"cpe:2.3:o:linux:linux_kernel:2.2.13",
"cpe:2.3:o:linux:linux_kernel:2.2.0",
"cpe:2.3:o:linux:linux_kernel:2.2.15:pre16",
"cpe:2.3:o:linux:linux_kernel:2.2.16",
"cpe:2.3:o:linux:linux_kernel:2.2.12",
"cpe:2.3:o:linux:linux_kernel:2.1.89",
"cpe:2.3:o:linux:linux_kernel:2.2.15_pre20",
"cpe:2.3:o:linux:linux_kernel:2.2.15",
"cpe:2.3:o:linux:linux_kernel:2.2.14",
"cpe:2.3:o:linux:linux_kernel:2.2.16:pre6",
"cpe:2.3:o:linux:linux_kernel"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431"
}
],
"description": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0432 and related exploits. | ftp on HP-UX 11.00 allows local users to gain privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0432",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0432",
"indicator": "CVE-1999-0432",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0432",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:hp-ux:11.00"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094",
"type": null,
"tags": [],
"name": "HPSBUX9903-094"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094",
"type": null,
"tags": [],
"name": "HPSBUX9903-094"
}
],
"description": "ftp on HP-UX 11.00 allows local users to gain privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0432. | ftp on HP-UX 11.00 allows local users to gain privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0432",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0432",
"indicator": "CVE-1999-0432",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0432",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:hp-ux:11.00"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094",
"type": null,
"tags": [],
"name": "HPSBUX9903-094"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094",
"type": null,
"tags": [],
"name": "HPSBUX9903-094"
}
],
"description": "ftp on HP-UX 11.00 allows local users to gain privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0432 be exploited? | ftp on HP-UX 11.00 allows local users to gain privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0432",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0432",
"indicator": "CVE-1999-0432",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0432",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:hp-ux:11.00"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094",
"type": null,
"tags": [],
"name": "HPSBUX9903-094"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094",
"type": null,
"tags": [],
"name": "HPSBUX9903-094"
}
],
"description": "ftp on HP-UX 11.00 allows local users to gain privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0433 and related exploits. | XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0433",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0433",
"indicator": "CVE-1999-0433",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0433",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:xfree86_project:x11r6:3.3.3",
"cpe:2.3:o:slackware:slackware_linux:3.5",
"cpe:2.3:o:redhat:linux:5.1",
"cpe:2.3:o:redhat:linux:5.2:*:i386",
"cpe:2.3:o:slackware:slackware_linux:3.4",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:slackware:slackware_linux:4.0",
"cpe:2.3:o:suse:suse_linux:5.2",
"cpe:2.3:o:suse:suse_linux:6.0",
"cpe:2.3:o:suse:suse_linux:6.1",
"cpe:2.3:o:suse:suse_linux:5.1",
"cpe:2.3:o:slackware:slackware_linux:3.6",
"cpe:2.3:o:slackware:slackware_linux:3.3",
"cpe:2.3:o:netbsd:netbsd:1.3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433"
}
],
"description": "XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-21T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0433. | XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0433",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0433",
"indicator": "CVE-1999-0433",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0433",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:xfree86_project:x11r6:3.3.3",
"cpe:2.3:o:slackware:slackware_linux:3.5",
"cpe:2.3:o:redhat:linux:5.1",
"cpe:2.3:o:redhat:linux:5.2:*:i386",
"cpe:2.3:o:slackware:slackware_linux:3.4",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:slackware:slackware_linux:4.0",
"cpe:2.3:o:suse:suse_linux:5.2",
"cpe:2.3:o:suse:suse_linux:6.0",
"cpe:2.3:o:suse:suse_linux:6.1",
"cpe:2.3:o:suse:suse_linux:5.1",
"cpe:2.3:o:slackware:slackware_linux:3.6",
"cpe:2.3:o:slackware:slackware_linux:3.3",
"cpe:2.3:o:netbsd:netbsd:1.3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433"
}
],
"description": "XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-21T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0433 be exploited? | XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0433",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0433",
"indicator": "CVE-1999-0433",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0433",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:xfree86_project:x11r6:3.3.3",
"cpe:2.3:o:slackware:slackware_linux:3.5",
"cpe:2.3:o:redhat:linux:5.1",
"cpe:2.3:o:redhat:linux:5.2:*:i386",
"cpe:2.3:o:slackware:slackware_linux:3.4",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:slackware:slackware_linux:4.0",
"cpe:2.3:o:suse:suse_linux:5.2",
"cpe:2.3:o:suse:suse_linux:6.0",
"cpe:2.3:o:suse:suse_linux:6.1",
"cpe:2.3:o:suse:suse_linux:5.1",
"cpe:2.3:o:slackware:slackware_linux:3.6",
"cpe:2.3:o:slackware:slackware_linux:3.3",
"cpe:2.3:o:netbsd:netbsd:1.3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433"
}
],
"description": "XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-21T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0434 and related exploits. | XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0434",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0434",
"indicator": "CVE-1999-0434",
"type_title": "CVE",
"base_indicator": {
"id": 2199220710,
"indicator": "CVE-1999-0434",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0434",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:caldera:openlinux:1.2",
"cpe:2.3:o:redhat:linux:5.1",
"cpe:2.3:o:debian:debian_linux:2.1",
"cpe:2.3:o:debian:debian_linux:2.0:r5",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:debian:debian_linux:2.0",
"cpe:2.3:o:suse:suse_linux:5.3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/359",
"type": null,
"tags": [
"Patch",
"Vendor Advisory"
],
"name": "359"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/359",
"type": null,
"tags": [
"Patch",
"Vendor Advisory"
],
"name": "359"
}
],
"description": "XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-30T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0434. | XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0434",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0434",
"indicator": "CVE-1999-0434",
"type_title": "CVE",
"base_indicator": {
"id": 2199220710,
"indicator": "CVE-1999-0434",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0434",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:caldera:openlinux:1.2",
"cpe:2.3:o:redhat:linux:5.1",
"cpe:2.3:o:debian:debian_linux:2.1",
"cpe:2.3:o:debian:debian_linux:2.0:r5",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:debian:debian_linux:2.0",
"cpe:2.3:o:suse:suse_linux:5.3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/359",
"type": null,
"tags": [
"Patch",
"Vendor Advisory"
],
"name": "359"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/359",
"type": null,
"tags": [
"Patch",
"Vendor Advisory"
],
"name": "359"
}
],
"description": "XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-30T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0434 be exploited? | XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0434",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0434",
"indicator": "CVE-1999-0434",
"type_title": "CVE",
"base_indicator": {
"id": 2199220710,
"indicator": "CVE-1999-0434",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0434",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:caldera:openlinux:1.2",
"cpe:2.3:o:redhat:linux:5.1",
"cpe:2.3:o:debian:debian_linux:2.1",
"cpe:2.3:o:debian:debian_linux:2.0:r5",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:debian:debian_linux:2.0",
"cpe:2.3:o:suse:suse_linux:5.3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/359",
"type": null,
"tags": [
"Patch",
"Vendor Advisory"
],
"name": "359"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/359",
"type": null,
"tags": [
"Patch",
"Vendor Advisory"
],
"name": "359"
}
],
"description": "XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-30T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0435 and related exploits. | MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0435",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0435",
"indicator": "CVE-1999-0435",
"type_title": "CVE",
"base_indicator": {
"id": 2199206706,
"indicator": "CVE-1999-0435",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0435",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.2",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:hp-ux:10.01",
"cpe:2.3:o:hp:hp-ux:10.00",
"cpe:2.3:o:hp:hp-ux:11.00",
"cpe:2.3:o:hp:hp-ux:10.20"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435"
}
],
"description": "MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0435. | MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0435",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0435",
"indicator": "CVE-1999-0435",
"type_title": "CVE",
"base_indicator": {
"id": 2199206706,
"indicator": "CVE-1999-0435",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0435",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.2",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:hp-ux:10.01",
"cpe:2.3:o:hp:hp-ux:10.00",
"cpe:2.3:o:hp:hp-ux:11.00",
"cpe:2.3:o:hp:hp-ux:10.20"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435"
}
],
"description": "MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0435 be exploited? | MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0435",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0435",
"indicator": "CVE-1999-0435",
"type_title": "CVE",
"base_indicator": {
"id": 2199206706,
"indicator": "CVE-1999-0435",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0435",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.2",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:hp-ux:10.01",
"cpe:2.3:o:hp:hp-ux:10.00",
"cpe:2.3:o:hp:hp-ux:11.00",
"cpe:2.3:o:hp:hp-ux:10.20"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435"
}
],
"description": "MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0436 and related exploits. | Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0436",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0436",
"indicator": "CVE-1999-0436",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0436",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:hp:desms:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:hp:desms",
"cpe:2.3:o:hp:hp-ux:11.00",
"cpe:2.3:o:hp:hp-ux:10.20"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095",
"type": null,
"tags": [],
"name": "HPSBUX9903-095"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095",
"type": null,
"tags": [],
"name": "HPSBUX9903-095"
}
],
"description": "Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0436. | Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0436",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0436",
"indicator": "CVE-1999-0436",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0436",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:hp:desms:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:hp:desms",
"cpe:2.3:o:hp:hp-ux:11.00",
"cpe:2.3:o:hp:hp-ux:10.20"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095",
"type": null,
"tags": [],
"name": "HPSBUX9903-095"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095",
"type": null,
"tags": [],
"name": "HPSBUX9903-095"
}
],
"description": "Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0436 be exploited? | Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0436",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0436",
"indicator": "CVE-1999-0436",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0436",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:hp:desms:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:hp:desms",
"cpe:2.3:o:hp:hp-ux:11.00",
"cpe:2.3:o:hp:hp-ux:10.20"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095",
"type": null,
"tags": [],
"name": "HPSBUX9903-095"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095",
"type": null,
"tags": [],
"name": "HPSBUX9903-095"
}
],
"description": "Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0437 and related exploits. | Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0437",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0437",
"indicator": "CVE-1999-0437",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0437",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:h:ramp_networks:webramp"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437"
}
],
"description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0437. | Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0437",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0437",
"indicator": "CVE-1999-0437",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0437",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:h:ramp_networks:webramp"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437"
}
],
"description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0437 be exploited? | Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0437",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0437",
"indicator": "CVE-1999-0437",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0437",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:h:ramp_networks:webramp"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437"
}
],
"description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0438 and related exploits. | Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0438",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0438",
"indicator": "CVE-1999-0438",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0438",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:h:ramp_networks:webramp_m3:1.0",
"cpe:2.3:h:ramp_networks:webramp_200i:1.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438"
}
],
"description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0438. | Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0438",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0438",
"indicator": "CVE-1999-0438",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0438",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:h:ramp_networks:webramp_m3:1.0",
"cpe:2.3:h:ramp_networks:webramp_200i:1.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438"
}
],
"description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0438 be exploited? | Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0438",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0438",
"indicator": "CVE-1999-0438",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0438",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:h:ramp_networks:webramp_m3:1.0",
"cpe:2.3:h:ramp_networks:webramp_200i:1.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438"
}
],
"description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0439 and related exploits. | Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0439",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0439",
"indicator": "CVE-1999-0439",
"type_title": "CVE",
"base_indicator": {
"id": 2199226891,
"indicator": "CVE-1999-0439",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0439",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:procmail:procmail",
"cpe:2.3:o:caldera:openlinux"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439"
}
],
"description": "Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-05T04:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0439. | Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0439",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0439",
"indicator": "CVE-1999-0439",
"type_title": "CVE",
"base_indicator": {
"id": 2199226891,
"indicator": "CVE-1999-0439",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0439",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:procmail:procmail",
"cpe:2.3:o:caldera:openlinux"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439"
}
],
"description": "Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-05T04:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0439 be exploited? | Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0439",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0439",
"indicator": "CVE-1999-0439",
"type_title": "CVE",
"base_indicator": {
"id": 2199226891,
"indicator": "CVE-1999-0439",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0439",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndIncluding": "3.12",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:procmail:procmail",
"cpe:2.3:o:caldera:openlinux"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439"
}
],
"description": "Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-05T04:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0440 and related exploits. | The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0440",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0440",
"indicator": "CVE-1999-0440",
"type_title": "CVE",
"base_indicator": {
"id": 2199205825,
"indicator": "CVE-1999-0440",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0440",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:netscape:navigator:4.05",
"cpe:2.3:a:sun:java",
"cpe:2.3:a:netscape:navigator:4.08",
"cpe:2.3:a:netscape:navigator:4.03",
"cpe:2.3:a:netscape:navigator:4.02",
"cpe:2.3:a:netscape:navigator:4.5",
"cpe:2.3:a:netscape:navigator:4.0",
"cpe:2.3:a:netscape:communicator:4.5",
"cpe:2.3:a:netscape:navigator:4.06",
"cpe:2.3:a:netscape:navigator:4.07",
"cpe:2.3:a:netscape:navigator:4.04",
"cpe:2.3:a:netscape:navigator:4.01",
"cpe:2.3:a:netscape:navigator:4.61"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://java.sun.com/pr/1999/03/pr990329-01.html",
"type": null,
"tags": [],
"name": "http://java.sun.com/pr/1999/03/pr990329-01.html"
},
{
"external_source": "",
"href": "http://java.sun.com/pr/1999/03/pr990329-01.html",
"type": null,
"tags": [],
"name": "http://java.sun.com/pr/1999/03/pr990329-01.html"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2",
"type": null,
"tags": [],
"name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2",
"type": null,
"tags": [],
"name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/1939",
"type": null,
"tags": [],
"name": "1939"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/1939",
"type": null,
"tags": [],
"name": "1939"
}
],
"description": "The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0440. | The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0440",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0440",
"indicator": "CVE-1999-0440",
"type_title": "CVE",
"base_indicator": {
"id": 2199205825,
"indicator": "CVE-1999-0440",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0440",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:netscape:navigator:4.05",
"cpe:2.3:a:sun:java",
"cpe:2.3:a:netscape:navigator:4.08",
"cpe:2.3:a:netscape:navigator:4.03",
"cpe:2.3:a:netscape:navigator:4.02",
"cpe:2.3:a:netscape:navigator:4.5",
"cpe:2.3:a:netscape:navigator:4.0",
"cpe:2.3:a:netscape:communicator:4.5",
"cpe:2.3:a:netscape:navigator:4.06",
"cpe:2.3:a:netscape:navigator:4.07",
"cpe:2.3:a:netscape:navigator:4.04",
"cpe:2.3:a:netscape:navigator:4.01",
"cpe:2.3:a:netscape:navigator:4.61"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://java.sun.com/pr/1999/03/pr990329-01.html",
"type": null,
"tags": [],
"name": "http://java.sun.com/pr/1999/03/pr990329-01.html"
},
{
"external_source": "",
"href": "http://java.sun.com/pr/1999/03/pr990329-01.html",
"type": null,
"tags": [],
"name": "http://java.sun.com/pr/1999/03/pr990329-01.html"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2",
"type": null,
"tags": [],
"name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2",
"type": null,
"tags": [],
"name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/1939",
"type": null,
"tags": [],
"name": "1939"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/1939",
"type": null,
"tags": [],
"name": "1939"
}
],
"description": "The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0440 be exploited? | The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0440",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0440",
"indicator": "CVE-1999-0440",
"type_title": "CVE",
"base_indicator": {
"id": 2199205825,
"indicator": "CVE-1999-0440",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0440",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.05:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.08:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.03:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.02:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.06:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.07:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.04:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:netscape:navigator:4.61:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:netscape:navigator:4.05",
"cpe:2.3:a:sun:java",
"cpe:2.3:a:netscape:navigator:4.08",
"cpe:2.3:a:netscape:navigator:4.03",
"cpe:2.3:a:netscape:navigator:4.02",
"cpe:2.3:a:netscape:navigator:4.5",
"cpe:2.3:a:netscape:navigator:4.0",
"cpe:2.3:a:netscape:communicator:4.5",
"cpe:2.3:a:netscape:navigator:4.06",
"cpe:2.3:a:netscape:navigator:4.07",
"cpe:2.3:a:netscape:navigator:4.04",
"cpe:2.3:a:netscape:navigator:4.01",
"cpe:2.3:a:netscape:navigator:4.61"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://java.sun.com/pr/1999/03/pr990329-01.html",
"type": null,
"tags": [],
"name": "http://java.sun.com/pr/1999/03/pr990329-01.html"
},
{
"external_source": "",
"href": "http://java.sun.com/pr/1999/03/pr990329-01.html",
"type": null,
"tags": [],
"name": "http://java.sun.com/pr/1999/03/pr990329-01.html"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2",
"type": null,
"tags": [],
"name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2",
"type": null,
"tags": [],
"name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/1939",
"type": null,
"tags": [],
"name": "1939"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/1939",
"type": null,
"tags": [],
"name": "1939"
}
],
"description": "The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0441 and related exploits. | Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0441",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0441",
"indicator": "CVE-1999-0441",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0441",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:qbik:wingate:3.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html",
"type": null,
"tags": [],
"name": "AD02221999"
},
{
"external_source": "",
"href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html",
"type": null,
"tags": [],
"name": "AD02221999"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/509",
"type": null,
"tags": [],
"name": "509"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/509",
"type": null,
"tags": [],
"name": "509"
}
],
"description": "Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-02-22T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0441. | Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0441",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0441",
"indicator": "CVE-1999-0441",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0441",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:qbik:wingate:3.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html",
"type": null,
"tags": [],
"name": "AD02221999"
},
{
"external_source": "",
"href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html",
"type": null,
"tags": [],
"name": "AD02221999"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/509",
"type": null,
"tags": [],
"name": "509"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/509",
"type": null,
"tags": [],
"name": "509"
}
],
"description": "Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-02-22T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0441 be exploited? | Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0441",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0441",
"indicator": "CVE-1999-0441",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0441",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:qbik:wingate:3.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html",
"type": null,
"tags": [],
"name": "AD02221999"
},
{
"external_source": "",
"href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html",
"type": null,
"tags": [],
"name": "AD02221999"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/509",
"type": null,
"tags": [],
"name": "509"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/509",
"type": null,
"tags": [],
"name": "509"
}
],
"description": "Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-02-22T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0442 and related exploits. | Solaris ff.core allows local users to modify files.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0442",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0442",
"indicator": "CVE-1999-0442",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0442",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:sun:solaris:2.5.1:*:x86",
"cpe:2.3:o:sun:solaris:2.5:*:x86",
"cpe:2.3:o:sun:sunos:5.7",
"cpe:2.3:o:sun:sunos:5.5",
"cpe:2.3:o:sun:solaris:7.0:*:x86",
"cpe:2.3:o:sun:sunos:5.5.1",
"cpe:2.3:o:sun:solaris:2.6",
"cpe:2.3:o:sun:sunos:-"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/327",
"type": null,
"tags": [],
"name": "327"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/327",
"type": null,
"tags": [],
"name": "327"
}
],
"description": "Solaris ff.core allows local users to modify files.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-07T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0442. | Solaris ff.core allows local users to modify files.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0442",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0442",
"indicator": "CVE-1999-0442",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0442",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:sun:solaris:2.5.1:*:x86",
"cpe:2.3:o:sun:solaris:2.5:*:x86",
"cpe:2.3:o:sun:sunos:5.7",
"cpe:2.3:o:sun:sunos:5.5",
"cpe:2.3:o:sun:solaris:7.0:*:x86",
"cpe:2.3:o:sun:sunos:5.5.1",
"cpe:2.3:o:sun:solaris:2.6",
"cpe:2.3:o:sun:sunos:-"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/327",
"type": null,
"tags": [],
"name": "327"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/327",
"type": null,
"tags": [],
"name": "327"
}
],
"description": "Solaris ff.core allows local users to modify files.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-07T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0442 be exploited? | Solaris ff.core allows local users to modify files.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0442",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0442",
"indicator": "CVE-1999-0442",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0442",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:sun:solaris:2.5.1:*:x86",
"cpe:2.3:o:sun:solaris:2.5:*:x86",
"cpe:2.3:o:sun:sunos:5.7",
"cpe:2.3:o:sun:sunos:5.5",
"cpe:2.3:o:sun:solaris:7.0:*:x86",
"cpe:2.3:o:sun:sunos:5.5.1",
"cpe:2.3:o:sun:solaris:2.6",
"cpe:2.3:o:sun:sunos:-"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/327",
"type": null,
"tags": [],
"name": "327"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/327",
"type": null,
"tags": [],
"name": "327"
}
],
"description": "Solaris ff.core allows local users to modify files.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-07T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0443 and related exploits. | Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0443",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0443",
"indicator": "CVE-1999-0443",
"type_title": "CVE",
"base_indicator": {
"id": 2199227441,
"indicator": "CVE-1999-0443",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0443",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:bmc:patrol_agent:3.2.3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/archive/1/13204",
"type": null,
"tags": [],
"name": "19990409 Patrol security bugs"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/archive/1/13204",
"type": null,
"tags": [],
"name": "19990409 Patrol security bugs"
}
],
"description": "Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0443. | Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0443",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0443",
"indicator": "CVE-1999-0443",
"type_title": "CVE",
"base_indicator": {
"id": 2199227441,
"indicator": "CVE-1999-0443",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0443",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:bmc:patrol_agent:3.2.3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/archive/1/13204",
"type": null,
"tags": [],
"name": "19990409 Patrol security bugs"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/archive/1/13204",
"type": null,
"tags": [],
"name": "19990409 Patrol security bugs"
}
],
"description": "Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0443 be exploited? | Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0443",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0443",
"indicator": "CVE-1999-0443",
"type_title": "CVE",
"base_indicator": {
"id": 2199227441,
"indicator": "CVE-1999-0443",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0443",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:bmc:patrol_agent:3.2.3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/archive/1/13204",
"type": null,
"tags": [],
"name": "19990409 Patrol security bugs"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/archive/1/13204",
"type": null,
"tags": [],
"name": "19990409 Patrol security bugs"
}
],
"description": "Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0444 and related exploits. | Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0444",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0444",
"indicator": "CVE-1999-0444",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0444",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:microsoft:windows_nt",
"cpe:2.3:o:microsoft:windows_95",
"cpe:2.3:o:microsoft:windows_98:*:gold"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2",
"type": null,
"tags": [],
"name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2"
},
{
"external_source": "",
"href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2",
"type": null,
"tags": [],
"name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2"
}
],
"description": "Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-12T04:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0444. | Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0444",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0444",
"indicator": "CVE-1999-0444",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0444",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:microsoft:windows_nt",
"cpe:2.3:o:microsoft:windows_95",
"cpe:2.3:o:microsoft:windows_98:*:gold"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2",
"type": null,
"tags": [],
"name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2"
},
{
"external_source": "",
"href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2",
"type": null,
"tags": [],
"name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2"
}
],
"description": "Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-12T04:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0444 be exploited? | Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0444",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0444",
"indicator": "CVE-1999-0444",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0444",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "5.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 5.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:microsoft:windows_nt",
"cpe:2.3:o:microsoft:windows_95",
"cpe:2.3:o:microsoft:windows_98:*:gold"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2",
"type": null,
"tags": [],
"name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2"
},
{
"external_source": "",
"href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2",
"type": null,
"tags": [],
"name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2"
}
],
"description": "Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-12T04:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0445 and related exploits. | In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0445",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0445",
"indicator": "CVE-1999-0445",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0445",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:cisco:ios:12.0\\(1\\)w",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg",
"cpe:2.3:o:cisco:ios:12.0t",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe",
"cpe:2.3:o:cisco:ios:12.0db",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf",
"cpe:2.3:o:cisco:ios:12.0s",
"cpe:2.3:o:cisco:ios:12.0",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/1104",
"type": null,
"tags": [],
"name": "1104"
},
{
"external_source": "",
"href": "http://www.osvdb.org/1104",
"type": null,
"tags": [],
"name": "1104"
}
],
"description": "In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0445. | In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0445",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0445",
"indicator": "CVE-1999-0445",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0445",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:cisco:ios:12.0\\(1\\)w",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg",
"cpe:2.3:o:cisco:ios:12.0t",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe",
"cpe:2.3:o:cisco:ios:12.0db",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf",
"cpe:2.3:o:cisco:ios:12.0s",
"cpe:2.3:o:cisco:ios:12.0",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/1104",
"type": null,
"tags": [],
"name": "1104"
},
{
"external_source": "",
"href": "http://www.osvdb.org/1104",
"type": null,
"tags": [],
"name": "1104"
}
],
"description": "In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0445 be exploited? | In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0445",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0445",
"indicator": "CVE-1999-0445",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0445",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:cisco:ios:12.0\\(1\\)w",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg",
"cpe:2.3:o:cisco:ios:12.0t",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe",
"cpe:2.3:o:cisco:ios:12.0db",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf",
"cpe:2.3:o:cisco:ios:12.0s",
"cpe:2.3:o:cisco:ios:12.0",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/1104",
"type": null,
"tags": [],
"name": "1104"
},
{
"external_source": "",
"href": "http://www.osvdb.org/1104",
"type": null,
"tags": [],
"name": "1104"
}
],
"description": "In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0446 and related exploits. | Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0446",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0446",
"indicator": "CVE-1999-0446",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0446",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:netbsd:netbsd:1.3.1",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:netbsd:netbsd:1.3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/7051",
"type": null,
"tags": [],
"name": "7051"
},
{
"external_source": "",
"href": "http://www.osvdb.org/7051",
"type": null,
"tags": [],
"name": "7051"
}
],
"description": "Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-12T04:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0446. | Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0446",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0446",
"indicator": "CVE-1999-0446",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0446",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:netbsd:netbsd:1.3.1",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:netbsd:netbsd:1.3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/7051",
"type": null,
"tags": [],
"name": "7051"
},
{
"external_source": "",
"href": "http://www.osvdb.org/7051",
"type": null,
"tags": [],
"name": "7051"
}
],
"description": "Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-12T04:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0446 be exploited? | Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0446",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0446",
"indicator": "CVE-1999-0446",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0446",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:netbsd:netbsd:1.3.1",
"cpe:2.3:o:netbsd:netbsd:1.3.3",
"cpe:2.3:o:netbsd:netbsd:1.3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/7051",
"type": null,
"tags": [],
"name": "7051"
},
{
"external_source": "",
"href": "http://www.osvdb.org/7051",
"type": null,
"tags": [],
"name": "7051"
}
],
"description": "Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-12T04:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0447 and related exploits. | Local users can gain privileges using the debug utility in the MPE/iX operating system.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0447",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0447",
"indicator": "CVE-1999-0447",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0447",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:mpe_ix"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006",
"type": null,
"tags": [],
"name": "HPSBMP9904-006"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006",
"type": null,
"tags": [],
"name": "HPSBMP9904-006"
}
],
"description": "Local users can gain privileges using the debug utility in the MPE/iX operating system.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0447. | Local users can gain privileges using the debug utility in the MPE/iX operating system.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0447",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0447",
"indicator": "CVE-1999-0447",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0447",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:mpe_ix"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006",
"type": null,
"tags": [],
"name": "HPSBMP9904-006"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006",
"type": null,
"tags": [],
"name": "HPSBMP9904-006"
}
],
"description": "Local users can gain privileges using the debug utility in the MPE/iX operating system.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0447 be exploited? | Local users can gain privileges using the debug utility in the MPE/iX operating system.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0447",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0447",
"indicator": "CVE-1999-0447",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0447",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": true,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:hp:mpe_ix"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006",
"type": null,
"tags": [],
"name": "HPSBMP9904-006"
},
{
"external_source": "",
"href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006",
"type": null,
"tags": [],
"name": "HPSBMP9904-006"
}
],
"description": "Local users can gain privileges using the debug utility in the MPE/iX operating system.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0448 and related exploits. | IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0448",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0448",
"indicator": "CVE-1999-0448",
"type_title": "CVE",
"base_indicator": {
"id": 227512469,
"indicator": "CVE-1999-0448",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0448",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448"
}
],
"description": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0448. | IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0448",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0448",
"indicator": "CVE-1999-0448",
"type_title": "CVE",
"base_indicator": {
"id": 227512469,
"indicator": "CVE-1999-0448",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0448",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448"
}
],
"description": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0448 be exploited? | IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0448",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0448",
"indicator": "CVE-1999-0448",
"type_title": "CVE",
"base_indicator": {
"id": 227512469,
"indicator": "CVE-1999-0448",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0448",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448"
}
],
"description": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0449 and related exploits. | The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0449",
"indicator": "CVE-1999-0449",
"type_title": "CVE",
"base_indicator": {
"id": 2199208290,
"indicator": "CVE-1999-0449",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0449",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.8",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/2",
"type": null,
"tags": [],
"name": "2"
},
{
"external_source": "",
"href": "http://www.osvdb.org/2",
"type": null,
"tags": [],
"name": "2"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3",
"type": null,
"tags": [],
"name": "3"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3",
"type": null,
"tags": [],
"name": "3"
},
{
"external_source": "",
"href": "http://www.osvdb.org/4",
"type": null,
"tags": [],
"name": "4"
},
{
"external_source": "",
"href": "http://www.osvdb.org/4",
"type": null,
"tags": [],
"name": "4"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/193",
"type": null,
"tags": [],
"name": "193"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/193",
"type": null,
"tags": [],
"name": "193"
}
],
"description": "The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-26T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0449. | The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0449",
"indicator": "CVE-1999-0449",
"type_title": "CVE",
"base_indicator": {
"id": 2199208290,
"indicator": "CVE-1999-0449",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0449",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.8",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/2",
"type": null,
"tags": [],
"name": "2"
},
{
"external_source": "",
"href": "http://www.osvdb.org/2",
"type": null,
"tags": [],
"name": "2"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3",
"type": null,
"tags": [],
"name": "3"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3",
"type": null,
"tags": [],
"name": "3"
},
{
"external_source": "",
"href": "http://www.osvdb.org/4",
"type": null,
"tags": [],
"name": "4"
},
{
"external_source": "",
"href": "http://www.osvdb.org/4",
"type": null,
"tags": [],
"name": "4"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/193",
"type": null,
"tags": [],
"name": "193"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/193",
"type": null,
"tags": [],
"name": "193"
}
],
"description": "The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-26T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0449 be exploited? | The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0449",
"indicator": "CVE-1999-0449",
"type_title": "CVE",
"base_indicator": {
"id": 2199208290,
"indicator": "CVE-1999-0449",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0449",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.8",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/2",
"type": null,
"tags": [],
"name": "2"
},
{
"external_source": "",
"href": "http://www.osvdb.org/2",
"type": null,
"tags": [],
"name": "2"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3",
"type": null,
"tags": [],
"name": "3"
},
{
"external_source": "",
"href": "http://www.osvdb.org/3",
"type": null,
"tags": [],
"name": "3"
},
{
"external_source": "",
"href": "http://www.osvdb.org/4",
"type": null,
"tags": [],
"name": "4"
},
{
"external_source": "",
"href": "http://www.osvdb.org/4",
"type": null,
"tags": [],
"name": "4"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/193",
"type": null,
"tags": [],
"name": "193"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/193",
"type": null,
"tags": [],
"name": "193"
}
],
"description": "The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-26T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0450 and related exploits. | In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0450",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0450",
"indicator": "CVE-1999-0450",
"type_title": "CVE",
"base_indicator": {
"id": 2199247539,
"indicator": "CVE-1999-0450",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0450",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_services:5.0",
"cpe:2.3:a:microsoft:internet_information_server:3.0",
"cpe:2.3:a:microsoft:internet_information_server:4.0",
"cpe:2.3:a:microsoft:internet_information_services:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/194",
"type": null,
"tags": [],
"name": "194"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/194",
"type": null,
"tags": [],
"name": "194"
}
],
"description": "In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-26T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0450. | In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0450",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0450",
"indicator": "CVE-1999-0450",
"type_title": "CVE",
"base_indicator": {
"id": 2199247539,
"indicator": "CVE-1999-0450",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0450",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_services:5.0",
"cpe:2.3:a:microsoft:internet_information_server:3.0",
"cpe:2.3:a:microsoft:internet_information_server:4.0",
"cpe:2.3:a:microsoft:internet_information_services:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/194",
"type": null,
"tags": [],
"name": "194"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/194",
"type": null,
"tags": [],
"name": "194"
}
],
"description": "In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-26T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0450 be exploited? | In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0450",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0450",
"indicator": "CVE-1999-0450",
"type_title": "CVE",
"base_indicator": {
"id": 2199247539,
"indicator": "CVE-1999-0450",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0450",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:microsoft:internet_information_services:5.0",
"cpe:2.3:a:microsoft:internet_information_server:3.0",
"cpe:2.3:a:microsoft:internet_information_server:4.0",
"cpe:2.3:a:microsoft:internet_information_services:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/194",
"type": null,
"tags": [],
"name": "194"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/194",
"type": null,
"tags": [],
"name": "194"
}
],
"description": "In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-26T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0451 and related exploits. | Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0451",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0451",
"indicator": "CVE-1999-0451",
"type_title": "CVE",
"base_indicator": {
"id": 3843191299,
"indicator": "CVE-1999-0451",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0451",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:linux:linux_kernel:2.2.0",
"cpe:2.3:o:linux:linux_kernel:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/343",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "343"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/343",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "343"
}
],
"description": "Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-19T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0451. | Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0451",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0451",
"indicator": "CVE-1999-0451",
"type_title": "CVE",
"base_indicator": {
"id": 3843191299,
"indicator": "CVE-1999-0451",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0451",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:linux:linux_kernel:2.2.0",
"cpe:2.3:o:linux:linux_kernel:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/343",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "343"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/343",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "343"
}
],
"description": "Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-19T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0451 be exploited? | Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0451",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0451",
"indicator": "CVE-1999-0451",
"type_title": "CVE",
"base_indicator": {
"id": 3843191299,
"indicator": "CVE-1999-0451",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0451",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "2.1",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:linux:linux_kernel:2.2.0",
"cpe:2.3:o:linux:linux_kernel:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/343",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "343"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/343",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "343"
}
],
"description": "Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-19T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0452 and related exploits. | A service or application has a backdoor password that was placed there by the developer.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0452",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0452",
"indicator": "CVE-1999-0452",
"type_title": "CVE",
"base_indicator": {
"id": 2199224509,
"indicator": "CVE-1999-0452",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0452",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0452",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0452"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0452",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0452"
}
],
"description": "A service or application has a backdoor password that was placed there by the developer.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0452. | A service or application has a backdoor password that was placed there by the developer.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0452",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0452",
"indicator": "CVE-1999-0452",
"type_title": "CVE",
"base_indicator": {
"id": 2199224509,
"indicator": "CVE-1999-0452",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0452",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0452",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0452"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0452",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0452"
}
],
"description": "A service or application has a backdoor password that was placed there by the developer.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0452 be exploited? | A service or application has a backdoor password that was placed there by the developer.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0452",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0452",
"indicator": "CVE-1999-0452",
"type_title": "CVE",
"base_indicator": {
"id": 2199224509,
"indicator": "CVE-1999-0452",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0452",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0452",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0452"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0452",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0452"
}
],
"description": "A service or application has a backdoor password that was placed there by the developer.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0453 and related exploits. | An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0453",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0453",
"indicator": "CVE-1999-0453",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0453",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-200",
"products": [
"cpe:2.3:h:cisco:router"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453"
}
],
"description": "An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0453. | An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0453",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0453",
"indicator": "CVE-1999-0453",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0453",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-200",
"products": [
"cpe:2.3:h:cisco:router"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453"
}
],
"description": "An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0453 be exploited? | An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0453",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0453",
"indicator": "CVE-1999-0453",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0453",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "CWE-200",
"products": [
"cpe:2.3:h:cisco:router"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453"
}
],
"description": "An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0454 and related exploits. | A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0454",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0454",
"indicator": "CVE-1999-0454",
"type_title": "CVE",
"base_indicator": {
"id": 2199237359,
"indicator": "CVE-1999-0454",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0454",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048"
}
],
"description": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0454. | A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0454",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0454",
"indicator": "CVE-1999-0454",
"type_title": "CVE",
"base_indicator": {
"id": 2199237359,
"indicator": "CVE-1999-0454",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0454",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048"
}
],
"description": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0454 be exploited? | A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0454",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0454",
"indicator": "CVE-1999-0454",
"type_title": "CVE",
"base_indicator": {
"id": 2199237359,
"indicator": "CVE-1999-0454",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0454",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048"
}
],
"description": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0455 and related exploits. | The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0455",
"indicator": "CVE-1999-0455",
"type_title": "CVE",
"base_indicator": {
"id": 2199229980,
"indicator": "CVE-1999-0455",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0455",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:allaire:coldfusion_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/115",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "115"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/115",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "115"
}
],
"description": "The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-12-25T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0455. | The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0455",
"indicator": "CVE-1999-0455",
"type_title": "CVE",
"base_indicator": {
"id": 2199229980,
"indicator": "CVE-1999-0455",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0455",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:allaire:coldfusion_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/115",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "115"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/115",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "115"
}
],
"description": "The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-12-25T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0455 be exploited? | The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0455",
"indicator": "CVE-1999-0455",
"type_title": "CVE",
"base_indicator": {
"id": 2199229980,
"indicator": "CVE-1999-0455",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0455",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "7.5",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 7.5,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:allaire:coldfusion_server:4.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/115",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "115"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/115",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "115"
}
],
"description": "The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-12-25T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0457 and related exploits. | Linux ftpwatch program allows local users to gain root privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0457",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0457",
"indicator": "CVE-1999-0457",
"type_title": "CVE",
"base_indicator": {
"id": 2199247466,
"indicator": "CVE-1999-0457",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0457",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.2",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:debian:debian_linux:1.3.1",
"cpe:2.3:o:debian:debian_linux:1.3",
"cpe:2.3:o:debian:debian_linux:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/317",
"type": null,
"tags": [],
"name": "317"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/317",
"type": null,
"tags": [],
"name": "317"
}
],
"description": "Linux ftpwatch program allows local users to gain root privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-17T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0457. | Linux ftpwatch program allows local users to gain root privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0457",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0457",
"indicator": "CVE-1999-0457",
"type_title": "CVE",
"base_indicator": {
"id": 2199247466,
"indicator": "CVE-1999-0457",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0457",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.2",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:debian:debian_linux:1.3.1",
"cpe:2.3:o:debian:debian_linux:1.3",
"cpe:2.3:o:debian:debian_linux:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/317",
"type": null,
"tags": [],
"name": "317"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/317",
"type": null,
"tags": [],
"name": "317"
}
],
"description": "Linux ftpwatch program allows local users to gain root privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-17T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0457 be exploited? | Linux ftpwatch program allows local users to gain root privileges.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0457",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0457",
"indicator": "CVE-1999-0457",
"type_title": "CVE",
"base_indicator": {
"id": 2199247466,
"indicator": "CVE-1999-0457",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0457",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "7.2",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:debian:debian_linux:1.3.1",
"cpe:2.3:o:debian:debian_linux:1.3",
"cpe:2.3:o:debian:debian_linux:2.0"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/317",
"type": null,
"tags": [],
"name": "317"
},
{
"external_source": "",
"href": "http://www.securityfocus.com/bid/317",
"type": null,
"tags": [],
"name": "317"
}
],
"description": "Linux ftpwatch program allows local users to gain root privileges.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-17T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0458 and related exploits. | L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0458",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0458",
"indicator": "CVE-1999-0458",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0458",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "2.1",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:l0pht:l0phtcrack:2.5"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/915",
"type": null,
"tags": [],
"name": "915"
},
{
"external_source": "",
"href": "http://www.osvdb.org/915",
"type": null,
"tags": [],
"name": "915"
}
],
"description": "L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-06T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0458. | L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0458",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0458",
"indicator": "CVE-1999-0458",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0458",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "2.1",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:l0pht:l0phtcrack:2.5"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/915",
"type": null,
"tags": [],
"name": "915"
},
{
"external_source": "",
"href": "http://www.osvdb.org/915",
"type": null,
"tags": [],
"name": "915"
}
],
"description": "L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-06T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0458 be exploited? | L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0458",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0458",
"indicator": "CVE-1999-0458",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0458",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "2.1",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:l0pht:l0phtcrack:2.5"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://www.osvdb.org/915",
"type": null,
"tags": [],
"name": "915"
},
{
"external_source": "",
"href": "http://www.osvdb.org/915",
"type": null,
"tags": [],
"name": "915"
}
],
"description": "L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-01-06T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0459 and related exploits. | Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0459",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0459",
"indicator": "CVE-1999-0459",
"type_title": "CVE",
"base_indicator": {
"id": 3843191300,
"indicator": "CVE-1999-0459",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0459",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459"
}
],
"description": "Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-02-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0459. | Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0459",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0459",
"indicator": "CVE-1999-0459",
"type_title": "CVE",
"base_indicator": {
"id": 3843191300,
"indicator": "CVE-1999-0459",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0459",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459"
}
],
"description": "Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-02-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0459 be exploited? | Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0459",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0459",
"indicator": "CVE-1999-0459",
"type_title": "CVE",
"base_indicator": {
"id": 3843191300,
"indicator": "CVE-1999-0459",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0459",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "LOCAL",
"Authentication": "NONE",
"Availability-Impact": "PARTIAL",
"Score": "4.6",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": true,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459"
}
],
"description": "Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.",
"date_modified": "2024-11-20T23:28:00",
"date_created": "1999-02-01T05:00:00",
"exploits": [],
"epss": null
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.