instruction
stringlengths
26
107
input
stringclasses
1 value
output
stringlengths
12
264k
Describe exploitation details for CVE CVE-1999-0609.
An incorrect configuration of the SoftCart CGI program "SoftCart.exe" could disclose private information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0609", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0609", "indicator": "CVE-1999-0609", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0609", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mercantec:softcart:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:mercantec:softcart" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" } ], "description": "An incorrect configuration of the SoftCart CGI program \"SoftCart.exe\" could disclose private information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0609 be exploited?
An incorrect configuration of the SoftCart CGI program "SoftCart.exe" could disclose private information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0609", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0609", "indicator": "CVE-1999-0609", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0609", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mercantec:softcart:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:mercantec:softcart" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" } ], "description": "An incorrect configuration of the SoftCart CGI program \"SoftCart.exe\" could disclose private information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0610 and related exploits.
An incorrect configuration of the Webcart CGI program could disclose private information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0610", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0610", "indicator": "CVE-1999-0610", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0610", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mountain_network_systems:webcart:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:mountain_network_systems:webcart" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" } ], "description": "An incorrect configuration of the Webcart CGI program could disclose private information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0610.
An incorrect configuration of the Webcart CGI program could disclose private information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0610", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0610", "indicator": "CVE-1999-0610", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0610", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mountain_network_systems:webcart:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:mountain_network_systems:webcart" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" } ], "description": "An incorrect configuration of the Webcart CGI program could disclose private information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0610 be exploited?
An incorrect configuration of the Webcart CGI program could disclose private information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0610", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0610", "indicator": "CVE-1999-0610", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0610", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:mountain_network_systems:webcart:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:mountain_network_systems:webcart" ], "seen_wild": false, "references": [ { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" }, { "external_source": "", "href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2", "type": null, "tags": [], "name": "19990420 Shopping Carts exposing CC data" } ], "description": "An incorrect configuration of the Webcart CGI program could disclose private information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-04-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0611 and related exploits.
A system-critical Windows NT registry key has an inappropriate value. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0611", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0611", "indicator": "CVE-1999-0611", "type_title": "CVE", "base_indicator": { "id": 2199218401, "indicator": "CVE-1999-0611", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0611", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0611", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0611" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0611", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0611" } ], "description": "A system-critical Windows NT registry key has an inappropriate value.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0611.
A system-critical Windows NT registry key has an inappropriate value. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0611", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0611", "indicator": "CVE-1999-0611", "type_title": "CVE", "base_indicator": { "id": 2199218401, "indicator": "CVE-1999-0611", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0611", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0611", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0611" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0611", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0611" } ], "description": "A system-critical Windows NT registry key has an inappropriate value.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0611 be exploited?
A system-critical Windows NT registry key has an inappropriate value. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0611", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0611", "indicator": "CVE-1999-0611", "type_title": "CVE", "base_indicator": { "id": 2199218401, "indicator": "CVE-1999-0611", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0611", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0611", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0611" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0611", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0611" } ], "description": "A system-critical Windows NT registry key has an inappropriate value.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0612 and related exploits.
A version of finger is running that exposes valid user information to any entity on the network. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0612", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0612", "indicator": "CVE-1999-0612", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0612", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:finger_service:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:gnu:fingerd", "cpe:2.3:a:gnu:finger_service", "cpe:2.3:o:microsoft:windows_nt", "cpe:2.3:o:microsoft:windows_2000" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0612", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0612" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0612", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0612" } ], "description": "A version of finger is running that exposes valid user information to any entity on the network.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-03-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0612.
A version of finger is running that exposes valid user information to any entity on the network. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0612", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0612", "indicator": "CVE-1999-0612", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0612", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:finger_service:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:gnu:fingerd", "cpe:2.3:a:gnu:finger_service", "cpe:2.3:o:microsoft:windows_nt", "cpe:2.3:o:microsoft:windows_2000" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0612", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0612" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0612", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0612" } ], "description": "A version of finger is running that exposes valid user information to any entity on the network.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-03-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0612 be exploited?
A version of finger is running that exposes valid user information to any entity on the network. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0612", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0612", "indicator": "CVE-1999-0612", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0612", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:gnu:finger_service:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:gnu:fingerd", "cpe:2.3:a:gnu:finger_service", "cpe:2.3:o:microsoft:windows_nt", "cpe:2.3:o:microsoft:windows_2000" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0612", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0612" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0612", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0612" } ], "description": "A version of finger is running that exposes valid user information to any entity on the network.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-03-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0613 and related exploits.
The rpc.sprayd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0613", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0613", "indicator": "CVE-1999-0613", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0613", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0613", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0613" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0613", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0613" } ], "description": "The rpc.sprayd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0613.
The rpc.sprayd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0613", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0613", "indicator": "CVE-1999-0613", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0613", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0613", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0613" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0613", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0613" } ], "description": "The rpc.sprayd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0613 be exploited?
The rpc.sprayd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0613", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0613", "indicator": "CVE-1999-0613", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0613", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0613", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0613" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0613", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0613" } ], "description": "The rpc.sprayd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0614 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0614", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0614", "indicator": "CVE-1999-0614", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0614", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The FTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0614.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0614", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0614", "indicator": "CVE-1999-0614", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0614", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The FTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0614 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0614", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0614", "indicator": "CVE-1999-0614", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0614", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The FTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0615 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0615", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0615", "indicator": "CVE-1999-0615", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0615", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SNMP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0615.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0615", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0615", "indicator": "CVE-1999-0615", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0615", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SNMP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0615 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0615", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0615", "indicator": "CVE-1999-0615", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0615", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SNMP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0616 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0616", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0616", "indicator": "CVE-1999-0616", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0616", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The TFTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0616.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0616", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0616", "indicator": "CVE-1999-0616", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0616", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The TFTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0616 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0616", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0616", "indicator": "CVE-1999-0616", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0616", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The TFTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0617 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0617", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0617", "indicator": "CVE-1999-0617", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0617", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SMTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0617.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0617", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0617", "indicator": "CVE-1999-0617", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0617", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SMTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0617 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0617", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0617", "indicator": "CVE-1999-0617", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0617", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SMTP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0618 and related exploits.
The rexec service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0618", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0618", "indicator": "CVE-1999-0618", "type_title": "CVE", "base_indicator": { "id": 2199232275, "indicator": "CVE-1999-0618", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0618", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0618", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0618" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0618", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0618" } ], "description": "The rexec service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0618.
The rexec service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0618", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0618", "indicator": "CVE-1999-0618", "type_title": "CVE", "base_indicator": { "id": 2199232275, "indicator": "CVE-1999-0618", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0618", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0618", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0618" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0618", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0618" } ], "description": "The rexec service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0618 be exploited?
The rexec service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0618", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0618", "indicator": "CVE-1999-0618", "type_title": "CVE", "base_indicator": { "id": 2199232275, "indicator": "CVE-1999-0618", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0618", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0618", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0618" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0618", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0618" } ], "description": "The rexec service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0619 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0619", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0619", "indicator": "CVE-1999-0619", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0619", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The Telnet service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0619.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0619", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0619", "indicator": "CVE-1999-0619", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0619", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The Telnet service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0619 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0619", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0619", "indicator": "CVE-1999-0619", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0619", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The Telnet service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0620 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0620", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0620", "indicator": "CVE-1999-0620", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0620", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NIS is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0620.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0620", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0620", "indicator": "CVE-1999-0620", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0620", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NIS is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0620 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0620", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0620", "indicator": "CVE-1999-0620", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0620", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NIS is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0621 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0621", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0621", "indicator": "CVE-1999-0621", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0621", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NETBIOS is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0621.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0621", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0621", "indicator": "CVE-1999-0621", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0621", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NETBIOS is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0621 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0621", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0621", "indicator": "CVE-1999-0621", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0621", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NETBIOS is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0622 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0622", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0622", "indicator": "CVE-1999-0622", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0622", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to DNS service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0622.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0622", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0622", "indicator": "CVE-1999-0622", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0622", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to DNS service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0622 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0622", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0622", "indicator": "CVE-1999-0622", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0622", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to DNS service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0623 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0623", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0623", "indicator": "CVE-1999-0623", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0623", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The X Windows service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0623.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0623", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0623", "indicator": "CVE-1999-0623", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0623", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The X Windows service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0623 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0623", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0623", "indicator": "CVE-1999-0623", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0623", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The X Windows service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0624 and related exploits.
The rstat/rstatd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0624", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0624", "indicator": "CVE-1999-0624", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0624", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0624", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0624" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0624", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0624" } ], "description": "The rstat/rstatd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0624.
The rstat/rstatd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0624", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0624", "indicator": "CVE-1999-0624", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0624", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0624", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0624" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0624", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0624" } ], "description": "The rstat/rstatd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0624 be exploited?
The rstat/rstatd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0624", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0624", "indicator": "CVE-1999-0624", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0624", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0624", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0624" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0624", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0624" } ], "description": "The rstat/rstatd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0625 and related exploits.
The rpc.rquotad service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0625", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0625", "indicator": "CVE-1999-0625", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0625", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0625", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0625" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0625", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0625" } ], "description": "The rpc.rquotad service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0625.
The rpc.rquotad service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0625", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0625", "indicator": "CVE-1999-0625", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0625", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0625", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0625" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0625", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0625" } ], "description": "The rpc.rquotad service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0625 be exploited?
The rpc.rquotad service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0625", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0625", "indicator": "CVE-1999-0625", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0625", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0625", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0625" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0625", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0625" } ], "description": "The rpc.rquotad service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0626 and related exploits.
A version of rusers is running that exposes valid user information to any entity on the network. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0626", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0626", "indicator": "CVE-1999-0626", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0626", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:rpc.ruserd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:sun:rpc.ruserd" ], "seen_wild": true, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0626", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0626" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0626", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0626" } ], "description": "A version of rusers is running that exposes valid user information to any entity on the network.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0626.
A version of rusers is running that exposes valid user information to any entity on the network. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0626", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0626", "indicator": "CVE-1999-0626", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0626", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:rpc.ruserd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:sun:rpc.ruserd" ], "seen_wild": true, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0626", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0626" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0626", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0626" } ], "description": "A version of rusers is running that exposes valid user information to any entity on the network.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0626 be exploited?
A version of rusers is running that exposes valid user information to any entity on the network. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0626", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0626", "indicator": "CVE-1999-0626", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0626", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:sun:rpc.ruserd:*:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:a:sun:rpc.ruserd" ], "seen_wild": true, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0626", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0626" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0626", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0626" } ], "description": "A version of rusers is running that exposes valid user information to any entity on the network.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0627 and related exploits.
The rexd service is running, which uses weak authentication that can allow an attacker to execute commands. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0627", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0627", "indicator": "CVE-1999-0627", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0627", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:ibm:aix:3.1", "cpe:2.3:o:ibm:aix:3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627" } ], "description": "The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.", "date_modified": "2024-11-20T23:29:00", "date_created": "1992-03-01T05:00:00", "exploits": [ { "author": "CANVAS", "cve": "CVE-1999-0627", "description": "rexd", "name": "rexd", "url": "http://exploitlist.immunityinc.com/home/exploitpack/rexd/rexd" } ], "epss": null }
Describe exploitation details for CVE CVE-1999-0627.
The rexd service is running, which uses weak authentication that can allow an attacker to execute commands. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0627", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0627", "indicator": "CVE-1999-0627", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0627", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:ibm:aix:3.1", "cpe:2.3:o:ibm:aix:3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627" } ], "description": "The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.", "date_modified": "2024-11-20T23:29:00", "date_created": "1992-03-01T05:00:00", "exploits": [ { "author": "CANVAS", "cve": "CVE-1999-0627", "description": "rexd", "name": "rexd", "url": "http://exploitlist.immunityinc.com/home/exploitpack/rexd/rexd" } ], "epss": null }
How can CVE CVE-1999-0627 be exploited?
The rexd service is running, which uses weak authentication that can allow an attacker to execute commands. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0627", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0627", "indicator": "CVE-1999-0627", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0627", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:ibm:aix:3.1", "cpe:2.3:o:ibm:aix:3.2" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627" } ], "description": "The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.", "date_modified": "2024-11-20T23:29:00", "date_created": "1992-03-01T05:00:00", "exploits": [ { "author": "CANVAS", "cve": "CVE-1999-0627", "description": "rexd", "name": "rexd", "url": "http://exploitlist.immunityinc.com/home/exploitpack/rexd/rexd" } ], "epss": null }
Explain CVE CVE-1999-0628 and related exploits.
The rwho/rwhod service is running, which exposes machine status and user information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0628", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0628", "indicator": "CVE-1999-0628", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0628", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:netbsd:netbsd:2.0.4", "cpe:2.3:o:ibm:aix:4.2", "cpe:2.3:o:freebsd:freebsd:6.2:stable", "cpe:2.3:o:linux:linux_kernel:2.6.20.1" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628" } ], "description": "The rwho/rwhod service is running, which exposes machine status and user information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-07-01T04:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0628.
The rwho/rwhod service is running, which exposes machine status and user information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0628", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0628", "indicator": "CVE-1999-0628", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0628", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:netbsd:netbsd:2.0.4", "cpe:2.3:o:ibm:aix:4.2", "cpe:2.3:o:freebsd:freebsd:6.2:stable", "cpe:2.3:o:linux:linux_kernel:2.6.20.1" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628" } ], "description": "The rwho/rwhod service is running, which exposes machine status and user information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-07-01T04:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0628 be exploited?
The rwho/rwhod service is running, which exposes machine status and user information. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0628", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0628", "indicator": "CVE-1999-0628", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0628", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "5.0", "Confidentiality-Impact": "PARTIAL", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cwe": "NVD-CWE-Other", "products": [ "cpe:2.3:o:netbsd:netbsd:2.0.4", "cpe:2.3:o:ibm:aix:4.2", "cpe:2.3:o:freebsd:freebsd:6.2:stable", "cpe:2.3:o:linux:linux_kernel:2.6.20.1" ], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628" } ], "description": "The rwho/rwhod service is running, which exposes machine status and user information.", "date_modified": "2024-11-20T23:29:00", "date_created": "1997-07-01T04:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0629 and related exploits.
The ident/identd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0629", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0629", "indicator": "CVE-1999-0629", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0629", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629" } ], "description": "The ident/identd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0629.
The ident/identd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0629", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0629", "indicator": "CVE-1999-0629", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0629", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629" } ], "description": "The ident/identd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0629 be exploited?
The ident/identd service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0629", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0629", "indicator": "CVE-1999-0629", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0629", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629" } ], "description": "The ident/identd service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0630 and related exploits.
The NT Alerter and Messenger services are running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0630", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0630", "indicator": "CVE-1999-0630", "type_title": "CVE", "base_indicator": { "id": 2199228567, "indicator": "CVE-1999-0630", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0630", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp", "type": null, "tags": [], "name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp" }, { "external_source": "", "href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp", "type": null, "tags": [], "name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp" } ], "description": "The NT Alerter and Messenger services are running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0630.
The NT Alerter and Messenger services are running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0630", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0630", "indicator": "CVE-1999-0630", "type_title": "CVE", "base_indicator": { "id": 2199228567, "indicator": "CVE-1999-0630", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0630", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp", "type": null, "tags": [], "name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp" }, { "external_source": "", "href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp", "type": null, "tags": [], "name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp" } ], "description": "The NT Alerter and Messenger services are running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0630 be exploited?
The NT Alerter and Messenger services are running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0630", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0630", "indicator": "CVE-1999-0630", "type_title": "CVE", "base_indicator": { "id": 2199228567, "indicator": "CVE-1999-0630", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0630", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp", "type": null, "tags": [], "name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp" }, { "external_source": "", "href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp", "type": null, "tags": [], "name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp" } ], "description": "The NT Alerter and Messenger services are running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0631 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0631", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0631", "indicator": "CVE-1999-0631", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0631", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The NFS service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0631.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0631", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0631", "indicator": "CVE-1999-0631", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0631", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The NFS service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0631 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0631", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0631", "indicator": "CVE-1999-0631", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0631", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The NFS service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0632 and related exploits.
The RPC portmapper service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0632", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0632", "indicator": "CVE-1999-0632", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0632", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0632", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0632" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0632", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0632" } ], "description": "The RPC portmapper service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0632.
The RPC portmapper service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0632", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0632", "indicator": "CVE-1999-0632", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0632", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0632", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0632" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0632", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0632" } ], "description": "The RPC portmapper service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0632 be exploited?
The RPC portmapper service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0632", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0632", "indicator": "CVE-1999-0632", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0632", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0632", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0632" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0632", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0632" } ], "description": "The RPC portmapper service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0633 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0633", "indicator": "CVE-1999-0633", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0633", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The HTTP/WWW service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0633.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0633", "indicator": "CVE-1999-0633", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0633", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The HTTP/WWW service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0633 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0633", "indicator": "CVE-1999-0633", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0633", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The HTTP/WWW service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0634 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0634", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0634", "indicator": "CVE-1999-0634", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0634", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SSH service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0634.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0634", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0634", "indicator": "CVE-1999-0634", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0634", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SSH service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0634 be exploited?
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0634", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0634", "indicator": "CVE-1999-0634", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0634", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SSH service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0635 and related exploits.
The echo service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0635", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0635", "indicator": "CVE-1999-0635", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0635", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html", "type": null, "tags": [], "name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services" }, { "external_source": "", "href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html", "type": null, "tags": [], "name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services" }, { "external_source": "", "href": "http://secunia.com/advisories/18514", "type": null, "tags": [ "Vendor Advisory" ], "name": "18514" }, { "external_source": "", "href": "http://secunia.com/advisories/18514", "type": null, "tags": [ "Vendor Advisory" ], "name": "18514" } ], "description": "The echo service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0635.
The echo service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0635", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0635", "indicator": "CVE-1999-0635", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0635", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html", "type": null, "tags": [], "name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services" }, { "external_source": "", "href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html", "type": null, "tags": [], "name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services" }, { "external_source": "", "href": "http://secunia.com/advisories/18514", "type": null, "tags": [ "Vendor Advisory" ], "name": "18514" }, { "external_source": "", "href": "http://secunia.com/advisories/18514", "type": null, "tags": [ "Vendor Advisory" ], "name": "18514" } ], "description": "The echo service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0635 be exploited?
The echo service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0635", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0635", "indicator": "CVE-1999-0635", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0635", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html", "type": null, "tags": [], "name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services" }, { "external_source": "", "href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html", "type": null, "tags": [], "name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services" }, { "external_source": "", "href": "http://secunia.com/advisories/18514", "type": null, "tags": [ "Vendor Advisory" ], "name": "18514" }, { "external_source": "", "href": "http://secunia.com/advisories/18514", "type": null, "tags": [ "Vendor Advisory" ], "name": "18514" } ], "description": "The echo service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0636 and related exploits.
The discard service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0636", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0636", "indicator": "CVE-1999-0636", "type_title": "CVE", "base_indicator": { "id": 2139718252, "indicator": "CVE-1999-0636", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0636", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0636", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0636" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0636", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0636" } ], "description": "The discard service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0636.
The discard service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0636", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0636", "indicator": "CVE-1999-0636", "type_title": "CVE", "base_indicator": { "id": 2139718252, "indicator": "CVE-1999-0636", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0636", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0636", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0636" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0636", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0636" } ], "description": "The discard service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0636 be exploited?
The discard service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0636", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0636", "indicator": "CVE-1999-0636", "type_title": "CVE", "base_indicator": { "id": 2139718252, "indicator": "CVE-1999-0636", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0636", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0636", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0636" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0636", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0636" } ], "description": "The discard service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0637 and related exploits.
The systat service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0637", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0637", "indicator": "CVE-1999-0637", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0637", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0637", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0637" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0637", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0637" } ], "description": "The systat service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0637.
The systat service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0637", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0637", "indicator": "CVE-1999-0637", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0637", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0637", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0637" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0637", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0637" } ], "description": "The systat service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0637 be exploited?
The systat service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0637", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0637", "indicator": "CVE-1999-0637", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0637", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0637", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0637" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0637", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0637" } ], "description": "The systat service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0638 and related exploits.
The daytime service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0638", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0638", "indicator": "CVE-1999-0638", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0638", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0638", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0638" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0638", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0638" } ], "description": "The daytime service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0638.
The daytime service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0638", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0638", "indicator": "CVE-1999-0638", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0638", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0638", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0638" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0638", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0638" } ], "description": "The daytime service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0638 be exploited?
The daytime service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0638", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0638", "indicator": "CVE-1999-0638", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0638", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0638", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0638" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0638", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0638" } ], "description": "The daytime service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0639 and related exploits.
The chargen service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0639", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0639", "indicator": "CVE-1999-0639", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0639", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0639", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0639" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0639", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0639" } ], "description": "The chargen service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0639.
The chargen service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0639", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0639", "indicator": "CVE-1999-0639", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0639", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0639", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0639" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0639", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0639" } ], "description": "The chargen service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0639 be exploited?
The chargen service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0639", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0639", "indicator": "CVE-1999-0639", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0639", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0639", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0639" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0639", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0639" } ], "description": "The chargen service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0640 and related exploits.
The Gopher service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0640", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0640", "indicator": "CVE-1999-0640", "type_title": "CVE", "base_indicator": { "id": 2199215609, "indicator": "CVE-1999-0640", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0640", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0640", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0640" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0640", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0640" } ], "description": "The Gopher service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0640.
The Gopher service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0640", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0640", "indicator": "CVE-1999-0640", "type_title": "CVE", "base_indicator": { "id": 2199215609, "indicator": "CVE-1999-0640", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0640", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0640", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0640" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0640", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0640" } ], "description": "The Gopher service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0640 be exploited?
The Gopher service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0640", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0640", "indicator": "CVE-1999-0640", "type_title": "CVE", "base_indicator": { "id": 2199215609, "indicator": "CVE-1999-0640", "type": "CVE", "title": "", "description": "", "content": "", "access_type": "public", "access_reason": "" }, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0640", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "COMPLETE", "Score": "10.0", "Confidentiality-Impact": "COMPLETE", "Integrity-Impact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0640", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0640" }, { "external_source": "", "href": "https://www.cve.org/CVERecord?id=CVE-1999-0640", "type": null, "tags": [], "name": "https://www.cve.org/CVERecord?id=CVE-1999-0640" } ], "description": "The Gopher service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0641 and related exploits.
The UUCP service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0641", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0641", "indicator": "CVE-1999-0641", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0641", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641" } ], "description": "The UUCP service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0641.
The UUCP service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0641", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0641", "indicator": "CVE-1999-0641", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0641", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641" } ], "description": "The UUCP service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
How can CVE CVE-1999-0641 be exploited?
The UUCP service is running. --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0641", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0641", "indicator": "CVE-1999-0641", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0641", "cvss": { "Access-Complexity": "LOW", "Access-Vector": "NETWORK", "Authentication": "NONE", "Availability-Impact": "NONE", "Score": "0.0", "Confidentiality-Impact": "NONE", "Integrity-Impact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N" }, "cvssv2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 0.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 0.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "LOW", "userInteractionRequired": false }, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "NVD-CWE-Other", "products": [], "seen_wild": false, "references": [ { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641" }, { "external_source": "", "href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641", "type": null, "tags": [], "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641" } ], "description": "The UUCP service is running.", "date_modified": "2024-11-20T23:29:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Explain CVE CVE-1999-0642 and related exploits.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0642", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0642", "indicator": "CVE-1999-0642", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0642", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A POP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }
Describe exploitation details for CVE CVE-1999-0642.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running." --- --- { "sections": [ "general", "nids_list", "malware" ], "mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0642", "nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0642", "indicator": "CVE-1999-0642", "type_title": "CVE", "base_indicator": {}, "pulse_info": { "count": 0, "pulses": [], "references": [], "related": { "alienvault": { "adversary": [], "malware_families": [], "industries": [] }, "other": { "adversary": [], "malware_families": [], "industries": [] } } }, "false_positive": [], "cve": "CVE-1999-0642", "cvss": {}, "cvssv2": {}, "cvssv3": {}, "configurations": { "CVE_data_version": "4.0", "nodes": [] }, "cwe": "", "products": [], "seen_wild": false, "references": [], "description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A POP service is running.", "date_modified": "2023-11-07T01:54:00", "date_created": "1999-01-01T05:00:00", "exploits": [], "epss": null }