instruction
stringlengths
26
107
input
stringclasses
1 value
output
stringlengths
12
264k
How can CVE CVE-1999-0425 be exploited?
talkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0425", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0425", "indicator": "CVE-1999-0425", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0425", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "6.4", "Confidentiality-Impact": "NONE", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.4, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:netscape:communicator:4.5" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425" } ], "description": "talkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-18T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0426 and related exploits.
The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0426", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0426", "indicator": "CVE-1999-0426", "type_title": "CVE", "base_indicator": { "id": 2199208283, "indicator": "CVE-1999-0426", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0426", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 }, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-276", "products": [ "cpe:2.3:o:suse:suse_linux:6.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426", "type": null, "tags": [ "Third Party Advisory", "VDB Entry" ], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426", "type": null, "tags": [ "Third Party Advisory", "VDB Entry" ], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426" } ], "description": "The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0426.
The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0426", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0426", "indicator": "CVE-1999-0426", "type_title": "CVE", "base_indicator": { "id": 2199208283, "indicator": "CVE-1999-0426", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0426", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 }, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-276", "products": [ "cpe:2.3:o:suse:suse_linux:6.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426", "type": null, "tags": [ "Third Party Advisory", "VDB Entry" ], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426", "type": null, "tags": [ "Third Party Advisory", "VDB Entry" ], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426" } ], "description": "The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0426 be exploited?
The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0426", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0426", "indicator": "CVE-1999-0426", "type_title": "CVE", "base_indicator": { "id": 2199208283, "indicator": "CVE-1999-0426", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0426", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 9.8, "baseSeverity": "CRITICAL", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 3.9, "impactScore": 5.9 }, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-276", "products": [ "cpe:2.3:o:suse:suse_linux:6.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426", "type": null, "tags": [ "Third Party Advisory", "VDB Entry" ], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426", "type": null, "tags": [ "Third Party Advisory", "VDB Entry" ], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426" } ], "description": "The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0427 and related exploits.
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0427", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0427", "indicator": "CVE-1999-0427", "type_title": "CVE", "base_indicator": { "id": 2199217787, "indicator": "CVE-1999-0427", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0427", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:qualcomm:eudora:4.3", "cpe:2.3:a:qualcomm:eudora:4.2", "cpe:2.3:a:qualcomm:eudora_pro:1.00", "cpe:2.3:a:qualcomm:eudora_light:3.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" } ], "description": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.", "date_modified": "2024-11-20T23:28:00", "date_created": "2000-05-01T04:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0427.
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0427", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0427", "indicator": "CVE-1999-0427", "type_title": "CVE", "base_indicator": { "id": 2199217787, "indicator": "CVE-1999-0427", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0427", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:qualcomm:eudora:4.3", "cpe:2.3:a:qualcomm:eudora:4.2", "cpe:2.3:a:qualcomm:eudora_pro:1.00", "cpe:2.3:a:qualcomm:eudora_light:3.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" } ], "description": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.", "date_modified": "2024-11-20T23:28:00", "date_created": "2000-05-01T04:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0427 be exploited?
Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0427", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0427", "indicator": "CVE-1999-0427", "type_title": "CVE", "base_indicator": { "id": 2199217787, "indicator": "CVE-1999-0427", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0427", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:qualcomm:eudora:4.3", "cpe:2.3:a:qualcomm:eudora:4.2", "cpe:2.3:a:qualcomm:eudora_pro:1.00", "cpe:2.3:a:qualcomm:eudora_light:3.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427" } ], "description": "Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names.", "date_modified": "2024-11-20T23:28:00", "date_created": "2000-05-01T04:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0428 and related exploits.
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0428", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0428", "indicator": "CVE-1999-0428", "type_title": "CVE", "base_indicator": { "id": 2199234211, "indicator": "CVE-1999-0428", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0428", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.2b", "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-384", "products": [ "cpe:2.3:a:openssl:openssl" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/3936", "type": null, "tags": [ "Broken Link" ], "name": "3936" }, { "external_source": "", "href": "http://www.osvdb.org/3936", "type": null, "tags": [ "Broken Link" ], "name": "3936" } ], "description": "OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-22T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0428.
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0428", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0428", "indicator": "CVE-1999-0428", "type_title": "CVE", "base_indicator": { "id": 2199234211, "indicator": "CVE-1999-0428", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0428", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.2b", "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-384", "products": [ "cpe:2.3:a:openssl:openssl" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/3936", "type": null, "tags": [ "Broken Link" ], "name": "3936" }, { "external_source": "", "href": "http://www.osvdb.org/3936", "type": null, "tags": [ "Broken Link" ], "name": "3936" } ], "description": "OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-22T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0428 be exploited?
OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0428", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0428", "indicator": "CVE-1999-0428", "type_title": "CVE", "base_indicator": { "id": 2199234211, "indicator": "CVE-1999-0428", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0428", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "0.9.2b", "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-384", "products": [ "cpe:2.3:a:openssl:openssl" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/3936", "type": null, "tags": [ "Broken Link" ], "name": "3936" }, { "external_source": "", "href": "http://www.osvdb.org/3936", "type": null, "tags": [ "Broken Link" ], "name": "3936" } ], "description": "OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-22T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0429 and related exploits.
The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0429", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0429", "indicator": "CVE-1999-0429", "type_title": "CVE", "base_indicator": { "id": 2199205799, "indicator": "CVE-1999-0429", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0429", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:ibm:lotus_notes:4.5" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2", "type": null, "tags": [], "name": "19990323" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2", "type": null, "tags": [], "name": "19990323" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2", "type": null, "tags": [], "name": "19990324 Re: LNotes encryption" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2", "type": null, "tags": [], "name": "19990324 Re: LNotes encryption" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2", "type": null, "tags": [], "name": "19990326 Lotus Notes Encryption Bug" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2", "type": null, "tags": [], "name": "19990326 Lotus Notes Encryption Bug" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2", "type": null, "tags": [], "name": "19990326 Re: Lotus Notes security advisory" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2", "type": null, "tags": [], "name": "19990326 Re: Lotus Notes security advisory" } ], "description": "The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the \"Encrypt Saved Mail\" preference.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0429.
The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0429", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0429", "indicator": "CVE-1999-0429", "type_title": "CVE", "base_indicator": { "id": 2199205799, "indicator": "CVE-1999-0429", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0429", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:ibm:lotus_notes:4.5" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2", "type": null, "tags": [], "name": "19990323" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2", "type": null, "tags": [], "name": "19990323" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2", "type": null, "tags": [], "name": "19990324 Re: LNotes encryption" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2", "type": null, "tags": [], "name": "19990324 Re: LNotes encryption" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2", "type": null, "tags": [], "name": "19990326 Lotus Notes Encryption Bug" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2", "type": null, "tags": [], "name": "19990326 Lotus Notes Encryption Bug" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2", "type": null, "tags": [], "name": "19990326 Re: Lotus Notes security advisory" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2", "type": null, "tags": [], "name": "19990326 Re: Lotus Notes security advisory" } ], "description": "The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the \"Encrypt Saved Mail\" preference.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0429 be exploited?
The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the "Encrypt Saved Mail" preference. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0429", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0429", "indicator": "CVE-1999-0429", "type_title": "CVE", "base_indicator": { "id": 2199205799, "indicator": "CVE-1999-0429", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0429", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:ibm:lotus_notes:4.5" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2", "type": null, "tags": [], "name": "19990323" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92221437025743&w=2", "type": null, "tags": [], "name": "19990323" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2", "type": null, "tags": [], "name": "19990324 Re: LNotes encryption" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92241547418689&w=2", "type": null, "tags": [], "name": "19990324 Re: LNotes encryption" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2", "type": null, "tags": [], "name": "19990326 Lotus Notes Encryption Bug" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92246997917866&w=2", "type": null, "tags": [], "name": "19990326 Lotus Notes Encryption Bug" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2", "type": null, "tags": [], "name": "19990326 Re: Lotus Notes security advisory" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92249282302994&w=2", "type": null, "tags": [], "name": "19990326 Re: Lotus Notes security advisory" } ], "description": "The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the \"Encrypt Saved Mail\" preference.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0430 and related exploits.
Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0430", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0430", "indicator": "CVE-1999-0430", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0430", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502", "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/1103", "type": null, "tags": [], "name": "1103" }, { "external_source": "", "href": "http://www.osvdb.org/1103", "type": null, "tags": [], "name": "1103" } ], "description": "Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0430.
Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0430", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0430", "indicator": "CVE-1999-0430", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0430", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502", "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/1103", "type": null, "tags": [], "name": "1103" }, { "external_source": "", "href": "http://www.osvdb.org/1103", "type": null, "tags": [], "name": "1103" } ], "description": "Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0430 be exploited?
Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0430", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0430", "indicator": "CVE-1999-0430", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0430", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501", "cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502", "cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29", "cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/1103", "type": null, "tags": [], "name": "1103" }, { "external_source": "", "href": "http://www.osvdb.org/1103", "type": null, "tags": [], "name": "1103" } ], "description": "Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0431 and related exploits.
Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0431", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0431", "indicator": "CVE-1999-0431", "type_title": "CVE", "base_indicator": { "id": 3843191298, "indicator": "CVE-1999-0431", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0431", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2.3", "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:linux:linux_kernel:2.2.10", "cpe:2.3:o:linux:linux_kernel:2.2.13", "cpe:2.3:o:linux:linux_kernel:2.2.0", "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16", "cpe:2.3:o:linux:linux_kernel:2.2.16", "cpe:2.3:o:linux:linux_kernel:2.2.12", "cpe:2.3:o:linux:linux_kernel:2.1.89", "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20", "cpe:2.3:o:linux:linux_kernel:2.2.15", "cpe:2.3:o:linux:linux_kernel:2.2.14", "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6", "cpe:2.3:o:linux:linux_kernel" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431" } ], "description": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0431.
Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0431", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0431", "indicator": "CVE-1999-0431", "type_title": "CVE", "base_indicator": { "id": 3843191298, "indicator": "CVE-1999-0431", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0431", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2.3", "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:linux:linux_kernel:2.2.10", "cpe:2.3:o:linux:linux_kernel:2.2.13", "cpe:2.3:o:linux:linux_kernel:2.2.0", "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16", "cpe:2.3:o:linux:linux_kernel:2.2.16", "cpe:2.3:o:linux:linux_kernel:2.2.12", "cpe:2.3:o:linux:linux_kernel:2.1.89", "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20", "cpe:2.3:o:linux:linux_kernel:2.2.15", "cpe:2.3:o:linux:linux_kernel:2.2.14", "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6", "cpe:2.3:o:linux:linux_kernel" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431" } ], "description": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0431 be exploited?
Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0431", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0431", "indicator": "CVE-1999-0431", "type_title": "CVE", "base_indicator": { "id": 3843191298, "indicator": "CVE-1999-0431", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0431", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "2.2.3", "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:linux:linux_kernel:2.2.10", "cpe:2.3:o:linux:linux_kernel:2.2.13", "cpe:2.3:o:linux:linux_kernel:2.2.0", "cpe:2.3:o:linux:linux_kernel:2.2.15:pre16", "cpe:2.3:o:linux:linux_kernel:2.2.16", "cpe:2.3:o:linux:linux_kernel:2.2.12", "cpe:2.3:o:linux:linux_kernel:2.1.89", "cpe:2.3:o:linux:linux_kernel:2.2.15_pre20", "cpe:2.3:o:linux:linux_kernel:2.2.15", "cpe:2.3:o:linux:linux_kernel:2.2.14", "cpe:2.3:o:linux:linux_kernel:2.2.16:pre6", "cpe:2.3:o:linux:linux_kernel" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431" } ], "description": "Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0432 and related exploits.
ftp on HP-UX 11.00 allows local users to gain privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0432", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0432", "indicator": "CVE-1999-0432", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0432", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:hp-ux:11.00" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094", "type": null, "tags": [], "name": "HPSBUX9903-094" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094", "type": null, "tags": [], "name": "HPSBUX9903-094" } ], "description": "ftp on HP-UX 11.00 allows local users to gain privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0432.
ftp on HP-UX 11.00 allows local users to gain privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0432", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0432", "indicator": "CVE-1999-0432", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0432", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:hp-ux:11.00" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094", "type": null, "tags": [], "name": "HPSBUX9903-094" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094", "type": null, "tags": [], "name": "HPSBUX9903-094" } ], "description": "ftp on HP-UX 11.00 allows local users to gain privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0432 be exploited?
ftp on HP-UX 11.00 allows local users to gain privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0432", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0432", "indicator": "CVE-1999-0432", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0432", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:hp-ux:11.00" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094", "type": null, "tags": [], "name": "HPSBUX9903-094" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094", "type": null, "tags": [], "name": "HPSBUX9903-094" } ], "description": "ftp on HP-UX 11.00 allows local users to gain privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0433 and related exploits.
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0433", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0433", "indicator": "CVE-1999-0433", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0433", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:xfree86_project:x11r6:3.3.3", "cpe:2.3:o:slackware:slackware_linux:3.5", "cpe:2.3:o:redhat:linux:5.1", "cpe:2.3:o:redhat:linux:5.2:*:i386", "cpe:2.3:o:slackware:slackware_linux:3.4", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:slackware:slackware_linux:4.0", "cpe:2.3:o:suse:suse_linux:5.2", "cpe:2.3:o:suse:suse_linux:6.0", "cpe:2.3:o:suse:suse_linux:6.1", "cpe:2.3:o:suse:suse_linux:5.1", "cpe:2.3:o:slackware:slackware_linux:3.6", "cpe:2.3:o:slackware:slackware_linux:3.3", "cpe:2.3:o:netbsd:netbsd:1.3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433" } ], "description": "XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-21T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0433.
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0433", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0433", "indicator": "CVE-1999-0433", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0433", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:xfree86_project:x11r6:3.3.3", "cpe:2.3:o:slackware:slackware_linux:3.5", "cpe:2.3:o:redhat:linux:5.1", "cpe:2.3:o:redhat:linux:5.2:*:i386", "cpe:2.3:o:slackware:slackware_linux:3.4", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:slackware:slackware_linux:4.0", "cpe:2.3:o:suse:suse_linux:5.2", "cpe:2.3:o:suse:suse_linux:6.0", "cpe:2.3:o:suse:suse_linux:6.1", "cpe:2.3:o:suse:suse_linux:5.1", "cpe:2.3:o:slackware:slackware_linux:3.6", "cpe:2.3:o:slackware:slackware_linux:3.3", "cpe:2.3:o:netbsd:netbsd:1.3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433" } ], "description": "XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-21T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0433 be exploited?
XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0433", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0433", "indicator": "CVE-1999-0433", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0433", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:xfree86_project:x11r6:3.3.3", "cpe:2.3:o:slackware:slackware_linux:3.5", "cpe:2.3:o:redhat:linux:5.1", "cpe:2.3:o:redhat:linux:5.2:*:i386", "cpe:2.3:o:slackware:slackware_linux:3.4", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:slackware:slackware_linux:4.0", "cpe:2.3:o:suse:suse_linux:5.2", "cpe:2.3:o:suse:suse_linux:6.0", "cpe:2.3:o:suse:suse_linux:6.1", "cpe:2.3:o:suse:suse_linux:5.1", "cpe:2.3:o:slackware:slackware_linux:3.6", "cpe:2.3:o:slackware:slackware_linux:3.3", "cpe:2.3:o:netbsd:netbsd:1.3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433" } ], "description": "XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-21T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0434 and related exploits.
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0434", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0434", "indicator": "CVE-1999-0434", "type_title": "CVE", "base_indicator": { "id": 2199220710, "indicator": "CVE-1999-0434", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0434", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:caldera:openlinux:1.2", "cpe:2.3:o:redhat:linux:5.1", "cpe:2.3:o:debian:debian_linux:2.1", "cpe:2.3:o:debian:debian_linux:2.0:r5", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:debian:debian_linux:2.0", "cpe:2.3:o:suse:suse_linux:5.3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/359", "type": null, "tags": [ "Patch", "Vendor Advisory" ], "name": "359" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/359", "type": null, "tags": [ "Patch", "Vendor Advisory" ], "name": "359" } ], "description": "XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-30T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0434.
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0434", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0434", "indicator": "CVE-1999-0434", "type_title": "CVE", "base_indicator": { "id": 2199220710, "indicator": "CVE-1999-0434", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0434", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:caldera:openlinux:1.2", "cpe:2.3:o:redhat:linux:5.1", "cpe:2.3:o:debian:debian_linux:2.1", "cpe:2.3:o:debian:debian_linux:2.0:r5", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:debian:debian_linux:2.0", "cpe:2.3:o:suse:suse_linux:5.3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/359", "type": null, "tags": [ "Patch", "Vendor Advisory" ], "name": "359" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/359", "type": null, "tags": [ "Patch", "Vendor Advisory" ], "name": "359" } ], "description": "XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-30T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0434 be exploited?
XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0434", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0434", "indicator": "CVE-1999-0434", "type_title": "CVE", "base_indicator": { "id": 2199220710, "indicator": "CVE-1999-0434", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0434", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:caldera:openlinux:1.2", "cpe:2.3:o:redhat:linux:5.1", "cpe:2.3:o:debian:debian_linux:2.1", "cpe:2.3:o:debian:debian_linux:2.0:r5", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:debian:debian_linux:2.0", "cpe:2.3:o:suse:suse_linux:5.3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/359", "type": null, "tags": [ "Patch", "Vendor Advisory" ], "name": "359" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/359", "type": null, "tags": [ "Patch", "Vendor Advisory" ], "name": "359" } ], "description": "XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-30T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0435 and related exploits.
MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0435", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0435", "indicator": "CVE-1999-0435", "type_title": "CVE", "base_indicator": { "id": 2199206706, "indicator": "CVE-1999-0435", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0435", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.2", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:hp-ux:10.01", "cpe:2.3:o:hp:hp-ux:10.00", "cpe:2.3:o:hp:hp-ux:11.00", "cpe:2.3:o:hp:hp-ux:10.20" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435" } ], "description": "MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0435.
MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0435", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0435", "indicator": "CVE-1999-0435", "type_title": "CVE", "base_indicator": { "id": 2199206706, "indicator": "CVE-1999-0435", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0435", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.2", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:hp-ux:10.01", "cpe:2.3:o:hp:hp-ux:10.00", "cpe:2.3:o:hp:hp-ux:11.00", "cpe:2.3:o:hp:hp-ux:10.20" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435" } ], "description": "MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0435 be exploited?
MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0435", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0435", "indicator": "CVE-1999-0435", "type_title": "CVE", "base_indicator": { "id": 2199206706, "indicator": "CVE-1999-0435", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0435", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.2", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:hp-ux:10.01", "cpe:2.3:o:hp:hp-ux:10.00", "cpe:2.3:o:hp:hp-ux:11.00", "cpe:2.3:o:hp:hp-ux:10.20" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435" } ], "description": "MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0436 and related exploits.
Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0436", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0436", "indicator": "CVE-1999-0436", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0436", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:hp:desms:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:hp:desms", "cpe:2.3:o:hp:hp-ux:11.00", "cpe:2.3:o:hp:hp-ux:10.20" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095", "type": null, "tags": [], "name": "HPSBUX9903-095" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095", "type": null, "tags": [], "name": "HPSBUX9903-095" } ], "description": "Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0436.
Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0436", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0436", "indicator": "CVE-1999-0436", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0436", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:hp:desms:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:hp:desms", "cpe:2.3:o:hp:hp-ux:11.00", "cpe:2.3:o:hp:hp-ux:10.20" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095", "type": null, "tags": [], "name": "HPSBUX9903-095" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095", "type": null, "tags": [], "name": "HPSBUX9903-095" } ], "description": "Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0436 be exploited?
Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0436", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0436", "indicator": "CVE-1999-0436", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0436", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:hp:desms:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:hp:desms", "cpe:2.3:o:hp:hp-ux:11.00", "cpe:2.3:o:hp:hp-ux:10.20" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095", "type": null, "tags": [], "name": "HPSBUX9903-095" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095", "type": null, "tags": [], "name": "HPSBUX9903-095" } ], "description": "Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0437 and related exploits.
Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0437", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0437", "indicator": "CVE-1999-0437", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0437", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:h:ramp_networks:webramp" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437" } ], "description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0437.
Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0437", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0437", "indicator": "CVE-1999-0437", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0437", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:h:ramp_networks:webramp" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437" } ], "description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0437 be exploited?
Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0437", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0437", "indicator": "CVE-1999-0437", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0437", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:h:ramp_networks:webramp" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437" } ], "description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0438 and related exploits.
Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0438", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0438", "indicator": "CVE-1999-0438", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0438", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:h:ramp_networks:webramp_m3:1.0", "cpe:2.3:h:ramp_networks:webramp_200i:1.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438" } ], "description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0438.
Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0438", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0438", "indicator": "CVE-1999-0438", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0438", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:h:ramp_networks:webramp_m3:1.0", "cpe:2.3:h:ramp_networks:webramp_200i:1.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438" } ], "description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0438 be exploited?
Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0438", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0438", "indicator": "CVE-1999-0438", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0438", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:h:ramp_networks:webramp_m3:1.0", "cpe:2.3:h:ramp_networks:webramp_200i:1.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438" } ], "description": "Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0439 and related exploits.
Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0439", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0439", "indicator": "CVE-1999-0439", "type_title": "CVE", "base_indicator": { "id": 2199226891, "indicator": "CVE-1999-0439", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0439", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:procmail:procmail", "cpe:2.3:o:caldera:openlinux" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439" } ], "description": "Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-05T04:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0439.
Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0439", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0439", "indicator": "CVE-1999-0439", "type_title": "CVE", "base_indicator": { "id": 2199226891, "indicator": "CVE-1999-0439", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0439", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:procmail:procmail", "cpe:2.3:o:caldera:openlinux" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439" } ], "description": "Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-05T04:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0439 be exploited?
Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0439", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0439", "indicator": "CVE-1999-0439", "type_title": "CVE", "base_indicator": { "id": 2199226891, "indicator": "CVE-1999-0439", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0439", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.12", "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:procmail:procmail", "cpe:2.3:o:caldera:openlinux" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439" } ], "description": "Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-05T04:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0440 and related exploits.
The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0440", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0440", "indicator": "CVE-1999-0440", "type_title": "CVE", "base_indicator": { "id": 2199205825, "indicator": "CVE-1999-0440", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0440", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:netscape:navigator:4.05", "cpe:2.3:a:sun:java", "cpe:2.3:a:netscape:navigator:4.08", "cpe:2.3:a:netscape:navigator:4.03", "cpe:2.3:a:netscape:navigator:4.02", "cpe:2.3:a:netscape:navigator:4.5", "cpe:2.3:a:netscape:navigator:4.0", "cpe:2.3:a:netscape:communicator:4.5", "cpe:2.3:a:netscape:navigator:4.06", "cpe:2.3:a:netscape:navigator:4.07", "cpe:2.3:a:netscape:navigator:4.04", "cpe:2.3:a:netscape:navigator:4.01", "cpe:2.3:a:netscape:navigator:4.61" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://java.sun.com/pr/1999/03/pr990329-01.html", "type": null, "tags": [], "name": "http://java.sun.com/pr/1999/03/pr990329-01.html" }, { "external_source": "", "href": "http://java.sun.com/pr/1999/03/pr990329-01.html", "type": null, "tags": [], "name": "http://java.sun.com/pr/1999/03/pr990329-01.html" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2", "type": null, "tags": [], "name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2", "type": null, "tags": [], "name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/1939", "type": null, "tags": [], "name": "1939" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/1939", "type": null, "tags": [], "name": "1939" } ], "description": "The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0440.
The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0440", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0440", "indicator": "CVE-1999-0440", "type_title": "CVE", "base_indicator": { "id": 2199205825, "indicator": "CVE-1999-0440", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0440", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:netscape:navigator:4.05", "cpe:2.3:a:sun:java", "cpe:2.3:a:netscape:navigator:4.08", "cpe:2.3:a:netscape:navigator:4.03", "cpe:2.3:a:netscape:navigator:4.02", "cpe:2.3:a:netscape:navigator:4.5", "cpe:2.3:a:netscape:navigator:4.0", "cpe:2.3:a:netscape:communicator:4.5", "cpe:2.3:a:netscape:navigator:4.06", "cpe:2.3:a:netscape:navigator:4.07", "cpe:2.3:a:netscape:navigator:4.04", "cpe:2.3:a:netscape:navigator:4.01", "cpe:2.3:a:netscape:navigator:4.61" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://java.sun.com/pr/1999/03/pr990329-01.html", "type": null, "tags": [], "name": "http://java.sun.com/pr/1999/03/pr990329-01.html" }, { "external_source": "", "href": "http://java.sun.com/pr/1999/03/pr990329-01.html", "type": null, "tags": [], "name": "http://java.sun.com/pr/1999/03/pr990329-01.html" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2", "type": null, "tags": [], "name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2", "type": null, "tags": [], "name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/1939", "type": null, "tags": [], "name": "1939" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/1939", "type": null, "tags": [], "name": "1939" } ], "description": "The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0440 be exploited?
The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0440", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0440", "indicator": "CVE-1999-0440", "type_title": "CVE", "base_indicator": { "id": 2199205825, "indicator": "CVE-1999-0440", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0440", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.05:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.08:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.03:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.02:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.06:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.07:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.04:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.01:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:netscape:navigator:4.61:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:netscape:navigator:4.05", "cpe:2.3:a:sun:java", "cpe:2.3:a:netscape:navigator:4.08", "cpe:2.3:a:netscape:navigator:4.03", "cpe:2.3:a:netscape:navigator:4.02", "cpe:2.3:a:netscape:navigator:4.5", "cpe:2.3:a:netscape:navigator:4.0", "cpe:2.3:a:netscape:communicator:4.5", "cpe:2.3:a:netscape:navigator:4.06", "cpe:2.3:a:netscape:navigator:4.07", "cpe:2.3:a:netscape:navigator:4.04", "cpe:2.3:a:netscape:navigator:4.01", "cpe:2.3:a:netscape:navigator:4.61" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://java.sun.com/pr/1999/03/pr990329-01.html", "type": null, "tags": [], "name": "http://java.sun.com/pr/1999/03/pr990329-01.html" }, { "external_source": "", "href": "http://java.sun.com/pr/1999/03/pr990329-01.html", "type": null, "tags": [], "name": "http://java.sun.com/pr/1999/03/pr990329-01.html" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2", "type": null, "tags": [], "name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92333596624452&w=2", "type": null, "tags": [], "name": "19990405 Security Hole in Java 2 (and JDK 1.1.x)" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/1939", "type": null, "tags": [], "name": "1939" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/1939", "type": null, "tags": [], "name": "1939" } ], "description": "The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0441 and related exploits.
Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0441", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0441", "indicator": "CVE-1999-0441", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0441", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:qbik:wingate:3.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html", "type": null, "tags": [], "name": "AD02221999" }, { "external_source": "", "href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html", "type": null, "tags": [], "name": "AD02221999" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/509", "type": null, "tags": [], "name": "509" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/509", "type": null, "tags": [], "name": "509" } ], "description": "Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-02-22T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0441.
Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0441", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0441", "indicator": "CVE-1999-0441", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0441", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:qbik:wingate:3.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html", "type": null, "tags": [], "name": "AD02221999" }, { "external_source": "", "href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html", "type": null, "tags": [], "name": "AD02221999" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/509", "type": null, "tags": [], "name": "509" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/509", "type": null, "tags": [], "name": "509" } ], "description": "Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-02-22T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0441 be exploited?
Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0441", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0441", "indicator": "CVE-1999-0441", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0441", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:qbik:wingate:3.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html", "type": null, "tags": [], "name": "AD02221999" }, { "external_source": "", "href": "http://www.eeye.com/html/Research/Advisories/AD02221999.html", "type": null, "tags": [], "name": "AD02221999" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/509", "type": null, "tags": [], "name": "509" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/509", "type": null, "tags": [], "name": "509" } ], "description": "Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-02-22T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0442 and related exploits.
Solaris ff.core allows local users to modify files. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0442", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0442", "indicator": "CVE-1999-0442", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0442", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:sun:solaris:2.5.1:*:x86", "cpe:2.3:o:sun:solaris:2.5:*:x86", "cpe:2.3:o:sun:sunos:5.7", "cpe:2.3:o:sun:sunos:5.5", "cpe:2.3:o:sun:solaris:7.0:*:x86", "cpe:2.3:o:sun:sunos:5.5.1", "cpe:2.3:o:sun:solaris:2.6", "cpe:2.3:o:sun:sunos:-" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/327", "type": null, "tags": [], "name": "327" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/327", "type": null, "tags": [], "name": "327" } ], "description": "Solaris ff.core allows local users to modify files.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-07T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0442.
Solaris ff.core allows local users to modify files. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0442", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0442", "indicator": "CVE-1999-0442", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0442", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:sun:solaris:2.5.1:*:x86", "cpe:2.3:o:sun:solaris:2.5:*:x86", "cpe:2.3:o:sun:sunos:5.7", "cpe:2.3:o:sun:sunos:5.5", "cpe:2.3:o:sun:solaris:7.0:*:x86", "cpe:2.3:o:sun:sunos:5.5.1", "cpe:2.3:o:sun:solaris:2.6", "cpe:2.3:o:sun:sunos:-" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/327", "type": null, "tags": [], "name": "327" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/327", "type": null, "tags": [], "name": "327" } ], "description": "Solaris ff.core allows local users to modify files.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-07T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0442 be exploited?
Solaris ff.core allows local users to modify files. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0442", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0442", "indicator": "CVE-1999-0442", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0442", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:sun:solaris:2.5.1:*:x86", "cpe:2.3:o:sun:solaris:2.5:*:x86", "cpe:2.3:o:sun:sunos:5.7", "cpe:2.3:o:sun:sunos:5.5", "cpe:2.3:o:sun:solaris:7.0:*:x86", "cpe:2.3:o:sun:sunos:5.5.1", "cpe:2.3:o:sun:solaris:2.6", "cpe:2.3:o:sun:sunos:-" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/327", "type": null, "tags": [], "name": "327" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/327", "type": null, "tags": [], "name": "327" } ], "description": "Solaris ff.core allows local users to modify files.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-07T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0443 and related exploits.
Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0443", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0443", "indicator": "CVE-1999-0443", "type_title": "CVE", "base_indicator": { "id": 2199227441, "indicator": "CVE-1999-0443", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0443", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:bmc:patrol_agent:3.2.3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/archive/1/13204", "type": null, "tags": [], "name": "19990409 Patrol security bugs" }, { "external_source": "", "href": "http://www.securityfocus.com/archive/1/13204", "type": null, "tags": [], "name": "19990409 Patrol security bugs" } ], "description": "Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0443.
Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0443", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0443", "indicator": "CVE-1999-0443", "type_title": "CVE", "base_indicator": { "id": 2199227441, "indicator": "CVE-1999-0443", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0443", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:bmc:patrol_agent:3.2.3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/archive/1/13204", "type": null, "tags": [], "name": "19990409 Patrol security bugs" }, { "external_source": "", "href": "http://www.securityfocus.com/archive/1/13204", "type": null, "tags": [], "name": "19990409 Patrol security bugs" } ], "description": "Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0443 be exploited?
Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0443", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0443", "indicator": "CVE-1999-0443", "type_title": "CVE", "base_indicator": { "id": 2199227441, "indicator": "CVE-1999-0443", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0443", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:bmc:patrol_agent:3.2.3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/archive/1/13204", "type": null, "tags": [], "name": "19990409 Patrol security bugs" }, { "external_source": "", "href": "http://www.securityfocus.com/archive/1/13204", "type": null, "tags": [], "name": "19990409 Patrol security bugs" } ], "description": "Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0444 and related exploits.
Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0444", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0444", "indicator": "CVE-1999-0444", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0444", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:microsoft:windows_nt", "cpe:2.3:o:microsoft:windows_95", "cpe:2.3:o:microsoft:windows_98:*:gold" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2", "type": null, "tags": [], "name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2" }, { "external_source": "", "href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2", "type": null, "tags": [], "name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2" } ], "description": "Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-12T04:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0444.
Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0444", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0444", "indicator": "CVE-1999-0444", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0444", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:microsoft:windows_nt", "cpe:2.3:o:microsoft:windows_95", "cpe:2.3:o:microsoft:windows_98:*:gold" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2", "type": null, "tags": [], "name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2" }, { "external_source": "", "href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2", "type": null, "tags": [], "name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2" } ], "description": "Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-12T04:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0444 be exploited?
Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0444", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0444", "indicator": "CVE-1999-0444", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0444", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "5.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:microsoft:windows_nt", "cpe:2.3:o:microsoft:windows_95", "cpe:2.3:o:microsoft:windows_98:*:gold" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2", "type": null, "tags": [], "name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2" }, { "external_source": "", "href": "https://marc.info/?l=bugtraq&m=92394891221029&w=2", "type": null, "tags": [], "name": "https://marc.info/?l=bugtraq&m=92394891221029&w=2" } ], "description": "Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-12T04:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0445 and related exploits.
In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0445", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0445", "indicator": "CVE-1999-0445", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0445", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:cisco:ios:12.0\\(1\\)w", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg", "cpe:2.3:o:cisco:ios:12.0t", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe", "cpe:2.3:o:cisco:ios:12.0db", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf", "cpe:2.3:o:cisco:ios:12.0s", "cpe:2.3:o:cisco:ios:12.0", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/1104", "type": null, "tags": [], "name": "1104" }, { "external_source": "", "href": "http://www.osvdb.org/1104", "type": null, "tags": [], "name": "1104" } ], "description": "In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0445.
In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0445", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0445", "indicator": "CVE-1999-0445", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0445", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:cisco:ios:12.0\\(1\\)w", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg", "cpe:2.3:o:cisco:ios:12.0t", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe", "cpe:2.3:o:cisco:ios:12.0db", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf", "cpe:2.3:o:cisco:ios:12.0s", "cpe:2.3:o:cisco:ios:12.0", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/1104", "type": null, "tags": [], "name": "1104" }, { "external_source": "", "href": "http://www.osvdb.org/1104", "type": null, "tags": [], "name": "1104" } ], "description": "In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0445 be exploited?
In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0445", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0445", "indicator": "CVE-1999-0445", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0445", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:cisco:ios:12.0\\(1\\)w", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xb", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xd", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xg", "cpe:2.3:o:cisco:ios:12.0t", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xe", "cpe:2.3:o:cisco:ios:12.0db", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xc", "cpe:2.3:o:cisco:ios:12.0\\(2\\)xf", "cpe:2.3:o:cisco:ios:12.0s", "cpe:2.3:o:cisco:ios:12.0", "cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/1104", "type": null, "tags": [], "name": "1104" }, { "external_source": "", "href": "http://www.osvdb.org/1104", "type": null, "tags": [], "name": "1104" } ], "description": "In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0446 and related exploits.
Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0446", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0446", "indicator": "CVE-1999-0446", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0446", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:netbsd:netbsd:1.3.1", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:netbsd:netbsd:1.3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/7051", "type": null, "tags": [], "name": "7051" }, { "external_source": "", "href": "http://www.osvdb.org/7051", "type": null, "tags": [], "name": "7051" } ], "description": "Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-12T04:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0446.
Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0446", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0446", "indicator": "CVE-1999-0446", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0446", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:netbsd:netbsd:1.3.1", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:netbsd:netbsd:1.3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/7051", "type": null, "tags": [], "name": "7051" }, { "external_source": "", "href": "http://www.osvdb.org/7051", "type": null, "tags": [], "name": "7051" } ], "description": "Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-12T04:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0446 be exploited?
Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0446", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0446", "indicator": "CVE-1999-0446", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0446", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:netbsd:netbsd:1.3.1", "cpe:2.3:o:netbsd:netbsd:1.3.3", "cpe:2.3:o:netbsd:netbsd:1.3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/7051", "type": null, "tags": [], "name": "7051" }, { "external_source": "", "href": "http://www.osvdb.org/7051", "type": null, "tags": [], "name": "7051" } ], "description": "Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-12T04:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0447 and related exploits.
Local users can gain privileges using the debug utility in the MPE/iX operating system. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0447", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0447", "indicator": "CVE-1999-0447", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0447", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:mpe_ix" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006", "type": null, "tags": [], "name": "HPSBMP9904-006" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006", "type": null, "tags": [], "name": "HPSBMP9904-006" } ], "description": "Local users can gain privileges using the debug utility in the MPE/iX operating system.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0447.
Local users can gain privileges using the debug utility in the MPE/iX operating system. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0447", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0447", "indicator": "CVE-1999-0447", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0447", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:mpe_ix" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006", "type": null, "tags": [], "name": "HPSBMP9904-006" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006", "type": null, "tags": [], "name": "HPSBMP9904-006" } ], "description": "Local users can gain privileges using the debug utility in the MPE/iX operating system.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0447 be exploited?
Local users can gain privileges using the debug utility in the MPE/iX operating system. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0447", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0447", "indicator": "CVE-1999-0447", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0447", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:hp:mpe_ix" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006", "type": null, "tags": [], "name": "HPSBMP9904-006" }, { "external_source": "", "href": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006", "type": null, "tags": [], "name": "HPSBMP9904-006" } ], "description": "Local users can gain privileges using the debug utility in the MPE/iX operating system.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0448 and related exploits.
IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0448", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0448", "indicator": "CVE-1999-0448", "type_title": "CVE", "base_indicator": { "id": 227512469, "indicator": "CVE-1999-0448", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0448", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448" } ], "description": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0448.
IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0448", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0448", "indicator": "CVE-1999-0448", "type_title": "CVE", "base_indicator": { "id": 227512469, "indicator": "CVE-1999-0448", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0448", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448" } ], "description": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0448 be exploited?
IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0448", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0448", "indicator": "CVE-1999-0448", "type_title": "CVE", "base_indicator": { "id": 227512469, "indicator": "CVE-1999-0448", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0448", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448" } ], "description": "IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0449 and related exploits.
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0449", "indicator": "CVE-1999-0449", "type_title": "CVE", "base_indicator": { "id": 2199208290, "indicator": "CVE-1999-0449", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0449", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.8", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/2", "type": null, "tags": [], "name": "2" }, { "external_source": "", "href": "http://www.osvdb.org/2", "type": null, "tags": [], "name": "2" }, { "external_source": "", "href": "http://www.osvdb.org/3", "type": null, "tags": [], "name": "3" }, { "external_source": "", "href": "http://www.osvdb.org/3", "type": null, "tags": [], "name": "3" }, { "external_source": "", "href": "http://www.osvdb.org/4", "type": null, "tags": [], "name": "4" }, { "external_source": "", "href": "http://www.osvdb.org/4", "type": null, "tags": [], "name": "4" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/193", "type": null, "tags": [], "name": "193" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/193", "type": null, "tags": [], "name": "193" } ], "description": "The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-26T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0449.
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0449", "indicator": "CVE-1999-0449", "type_title": "CVE", "base_indicator": { "id": 2199208290, "indicator": "CVE-1999-0449", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0449", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.8", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/2", "type": null, "tags": [], "name": "2" }, { "external_source": "", "href": "http://www.osvdb.org/2", "type": null, "tags": [], "name": "2" }, { "external_source": "", "href": "http://www.osvdb.org/3", "type": null, "tags": [], "name": "3" }, { "external_source": "", "href": "http://www.osvdb.org/3", "type": null, "tags": [], "name": "3" }, { "external_source": "", "href": "http://www.osvdb.org/4", "type": null, "tags": [], "name": "4" }, { "external_source": "", "href": "http://www.osvdb.org/4", "type": null, "tags": [], "name": "4" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/193", "type": null, "tags": [], "name": "193" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/193", "type": null, "tags": [], "name": "193" } ], "description": "The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-26T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0449 be exploited?
The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0449", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0449", "indicator": "CVE-1999-0449", "type_title": "CVE", "base_indicator": { "id": 2199208290, "indicator": "CVE-1999-0449", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0449", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.8", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.8, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/2", "type": null, "tags": [], "name": "2" }, { "external_source": "", "href": "http://www.osvdb.org/2", "type": null, "tags": [], "name": "2" }, { "external_source": "", "href": "http://www.osvdb.org/3", "type": null, "tags": [], "name": "3" }, { "external_source": "", "href": "http://www.osvdb.org/3", "type": null, "tags": [], "name": "3" }, { "external_source": "", "href": "http://www.osvdb.org/4", "type": null, "tags": [], "name": "4" }, { "external_source": "", "href": "http://www.osvdb.org/4", "type": null, "tags": [], "name": "4" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/193", "type": null, "tags": [], "name": "193" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/193", "type": null, "tags": [], "name": "193" } ], "description": "The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-26T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0450 and related exploits.
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0450", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0450", "indicator": "CVE-1999-0450", "type_title": "CVE", "base_indicator": { "id": 2199247539, "indicator": "CVE-1999-0450", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0450", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_services:5.0", "cpe:2.3:a:microsoft:internet_information_server:3.0", "cpe:2.3:a:microsoft:internet_information_server:4.0", "cpe:2.3:a:microsoft:internet_information_services:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/194", "type": null, "tags": [], "name": "194" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/194", "type": null, "tags": [], "name": "194" } ], "description": "In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-26T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0450.
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0450", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0450", "indicator": "CVE-1999-0450", "type_title": "CVE", "base_indicator": { "id": 2199247539, "indicator": "CVE-1999-0450", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0450", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_services:5.0", "cpe:2.3:a:microsoft:internet_information_server:3.0", "cpe:2.3:a:microsoft:internet_information_server:4.0", "cpe:2.3:a:microsoft:internet_information_services:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/194", "type": null, "tags": [], "name": "194" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/194", "type": null, "tags": [], "name": "194" } ], "description": "In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-26T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0450 be exploited?
In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe). --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0450", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0450", "indicator": "CVE-1999-0450", "type_title": "CVE", "base_indicator": { "id": 2199247539, "indicator": "CVE-1999-0450", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0450", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:microsoft:internet_information_services:5.0", "cpe:2.3:a:microsoft:internet_information_server:3.0", "cpe:2.3:a:microsoft:internet_information_server:4.0", "cpe:2.3:a:microsoft:internet_information_services:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/194", "type": null, "tags": [], "name": "194" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/194", "type": null, "tags": [], "name": "194" } ], "description": "In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe).", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-26T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0451 and related exploits.
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0451", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0451", "indicator": "CVE-1999-0451", "type_title": "CVE", "base_indicator": { "id": 3843191299, "indicator": "CVE-1999-0451", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0451", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:linux:linux_kernel:2.2.0", "cpe:2.3:o:linux:linux_kernel:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/343", "type": null, "tags": [ "Vendor Advisory" ], "name": "343" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/343", "type": null, "tags": [ "Vendor Advisory" ], "name": "343" } ], "description": "Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-19T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0451.
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0451", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0451", "indicator": "CVE-1999-0451", "type_title": "CVE", "base_indicator": { "id": 3843191299, "indicator": "CVE-1999-0451", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0451", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:linux:linux_kernel:2.2.0", "cpe:2.3:o:linux:linux_kernel:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/343", "type": null, "tags": [ "Vendor Advisory" ], "name": "343" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/343", "type": null, "tags": [ "Vendor Advisory" ], "name": "343" } ], "description": "Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-19T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0451 be exploited?
Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0451", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0451", "indicator": "CVE-1999-0451", "type_title": "CVE", "base_indicator": { "id": 3843191299, "indicator": "CVE-1999-0451", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0451", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "2.1", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:linux:linux_kernel:2.2.0", "cpe:2.3:o:linux:linux_kernel:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/343", "type": null, "tags": [ "Vendor Advisory" ], "name": "343" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/343", "type": null, "tags": [ "Vendor Advisory" ], "name": "343" } ], "description": "Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-19T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0452 and related exploits.
A service or application has a backdoor password that was placed there by the developer. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0452", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0452", "indicator": "CVE-1999-0452", "type_title": "CVE", "base_indicator": { "id": 2199224509, "indicator": "CVE-1999-0452", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0452", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0452", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0452" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0452", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0452" } ], "description": "A service or application has a backdoor password that was placed there by the developer.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0452.
A service or application has a backdoor password that was placed there by the developer. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0452", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0452", "indicator": "CVE-1999-0452", "type_title": "CVE", "base_indicator": { "id": 2199224509, "indicator": "CVE-1999-0452", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0452", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0452", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0452" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0452", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0452" } ], "description": "A service or application has a backdoor password that was placed there by the developer.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0452 be exploited?
A service or application has a backdoor password that was placed there by the developer. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0452", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0452", "indicator": "CVE-1999-0452", "type_title": "CVE", "base_indicator": { "id": 2199224509, "indicator": "CVE-1999-0452", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0452", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0452", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0452" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0452", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0452" } ], "description": "A service or application has a backdoor password that was placed there by the developer.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0453 and related exploits.
An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP). --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0453", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0453", "indicator": "CVE-1999-0453", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0453", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-200", "products": [ "cpe:2.3:h:cisco:router" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453" } ], "description": "An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0453.
An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP). --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0453", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0453", "indicator": "CVE-1999-0453", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0453", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-200", "products": [ "cpe:2.3:h:cisco:router" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453" } ], "description": "An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0453 be exploited?
An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP). --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0453", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0453", "indicator": "CVE-1999-0453", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0453", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "CWE-200", "products": [ "cpe:2.3:h:cisco:router" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453" } ], "description": "An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP).", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0454 and related exploits.
A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0454", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0454", "indicator": "CVE-1999-0454", "type_title": "CVE", "base_indicator": { "id": 2199237359, "indicator": "CVE-1999-0454", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0454", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048" } ], "description": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0454.
A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0454", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0454", "indicator": "CVE-1999-0454", "type_title": "CVE", "base_indicator": { "id": 2199237359, "indicator": "CVE-1999-0454", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0454", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048" } ], "description": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0454 be exploited?
A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0454", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0454", "indicator": "CVE-1999-0454", "type_title": "CVE", "base_indicator": { "id": 2199237359, "indicator": "CVE-1999-0454", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0454", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/2048" } ], "description": "A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0455 and related exploits.
The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0455", "indicator": "CVE-1999-0455", "type_title": "CVE", "base_indicator": { "id": 2199229980, "indicator": "CVE-1999-0455", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0455", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:allaire:coldfusion_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/115", "type": null, "tags": [ "Vendor Advisory" ], "name": "115" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/115", "type": null, "tags": [ "Vendor Advisory" ], "name": "115" } ], "description": "The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-12-25T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0455.
The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0455", "indicator": "CVE-1999-0455", "type_title": "CVE", "base_indicator": { "id": 2199229980, "indicator": "CVE-1999-0455", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0455", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:allaire:coldfusion_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/115", "type": null, "tags": [ "Vendor Advisory" ], "name": "115" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/115", "type": null, "tags": [ "Vendor Advisory" ], "name": "115" } ], "description": "The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-12-25T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0455 be exploited?
The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0455", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0455", "indicator": "CVE-1999-0455", "type_title": "CVE", "base_indicator": { "id": 2199229980, "indicator": "CVE-1999-0455", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0455", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "7.5", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:allaire:coldfusion_server:4.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/115", "type": null, "tags": [ "Vendor Advisory" ], "name": "115" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/115", "type": null, "tags": [ "Vendor Advisory" ], "name": "115" } ], "description": "The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-12-25T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0457 and related exploits.
Linux ftpwatch program allows local users to gain root privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0457", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0457", "indicator": "CVE-1999-0457", "type_title": "CVE", "base_indicator": { "id": 2199247466, "indicator": "CVE-1999-0457", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0457", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.2", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:debian:debian_linux:1.3.1", "cpe:2.3:o:debian:debian_linux:1.3", "cpe:2.3:o:debian:debian_linux:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/317", "type": null, "tags": [], "name": "317" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/317", "type": null, "tags": [], "name": "317" } ], "description": "Linux ftpwatch program allows local users to gain root privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-17T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0457.
Linux ftpwatch program allows local users to gain root privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0457", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0457", "indicator": "CVE-1999-0457", "type_title": "CVE", "base_indicator": { "id": 2199247466, "indicator": "CVE-1999-0457", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0457", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.2", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:debian:debian_linux:1.3.1", "cpe:2.3:o:debian:debian_linux:1.3", "cpe:2.3:o:debian:debian_linux:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/317", "type": null, "tags": [], "name": "317" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/317", "type": null, "tags": [], "name": "317" } ], "description": "Linux ftpwatch program allows local users to gain root privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-17T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0457 be exploited?
Linux ftpwatch program allows local users to gain root privileges. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0457", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0457", "indicator": "CVE-1999-0457", "type_title": "CVE", "base_indicator": { "id": 2199247466, "indicator": "CVE-1999-0457", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0457", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "7.2", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:debian:debian_linux:1.3.1", "cpe:2.3:o:debian:debian_linux:1.3", "cpe:2.3:o:debian:debian_linux:2.0" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.securityfocus.com/bid/317", "type": null, "tags": [], "name": "317" }, { "external_source": "", "href": "http://www.securityfocus.com/bid/317", "type": null, "tags": [], "name": "317" } ], "description": "Linux ftpwatch program allows local users to gain root privileges.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-17T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0458 and related exploits.
L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0458", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0458", "indicator": "CVE-1999-0458", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0458", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "2.1", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:l0pht:l0phtcrack:2.5" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/915", "type": null, "tags": [], "name": "915" }, { "external_source": "", "href": "http://www.osvdb.org/915", "type": null, "tags": [], "name": "915" } ], "description": "L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-06T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0458.
L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0458", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0458", "indicator": "CVE-1999-0458", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0458", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "2.1", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:l0pht:l0phtcrack:2.5" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/915", "type": null, "tags": [], "name": "915" }, { "external_source": "", "href": "http://www.osvdb.org/915", "type": null, "tags": [], "name": "915" } ], "description": "L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-06T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0458 be exploited?
L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0458", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0458", "indicator": "CVE-1999-0458", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0458", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "2.1", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:l0pht:l0phtcrack:2.5" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://www.osvdb.org/915", "type": null, "tags": [], "name": "915" }, { "external_source": "", "href": "http://www.osvdb.org/915", "type": null, "tags": [], "name": "915" } ], "description": "L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-01-06T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0459 and related exploits.
Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0459", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0459", "indicator": "CVE-1999-0459", "type_title": "CVE", "base_indicator": { "id": 3843191300, "indicator": "CVE-1999-0459", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0459", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459" } ], "description": "Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-02-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0459.
Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0459", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0459", "indicator": "CVE-1999-0459", "type_title": "CVE", "base_indicator": { "id": 3843191300, "indicator": "CVE-1999-0459", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0459", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459" } ], "description": "Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-02-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0459 be exploited?
Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0459", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0459", "indicator": "CVE-1999-0459", "type_title": "CVE", "base_indicator": { "id": 3843191300, "indicator": "CVE-1999-0459", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0459", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "LOCAL", "Authentication": "NONE", "Availability-Impact": "PARTIAL", "Score": "4.6", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": true, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459" } ], "description": "Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot.", "date_modified": "2024-11-20T23:28:00", "date_created": "1999-02-01T05:00:00", "exploits": [], "epss": null }