instruction
stringlengths 26
107
| input
stringclasses 1
value | output
stringlengths 12
264k
|
---|---|---|
Describe exploitation details for CVE CVE-1999-0609. | An incorrect configuration of the SoftCart CGI program "SoftCart.exe" could disclose private information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0609",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0609",
"indicator": "CVE-1999-0609",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0609",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mercantec:softcart:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:mercantec:softcart"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
}
],
"description": "An incorrect configuration of the SoftCart CGI program \"SoftCart.exe\" could disclose private information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0609 be exploited? | An incorrect configuration of the SoftCart CGI program "SoftCart.exe" could disclose private information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0609",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0609",
"indicator": "CVE-1999-0609",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0609",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mercantec:softcart:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:mercantec:softcart"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
}
],
"description": "An incorrect configuration of the SoftCart CGI program \"SoftCart.exe\" could disclose private information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0610 and related exploits. | An incorrect configuration of the Webcart CGI program could disclose private information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0610",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0610",
"indicator": "CVE-1999-0610",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0610",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mountain_network_systems:webcart:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:mountain_network_systems:webcart"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
}
],
"description": "An incorrect configuration of the Webcart CGI program could disclose private information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0610. | An incorrect configuration of the Webcart CGI program could disclose private information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0610",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0610",
"indicator": "CVE-1999-0610",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0610",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mountain_network_systems:webcart:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:mountain_network_systems:webcart"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
}
],
"description": "An incorrect configuration of the Webcart CGI program could disclose private information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0610 be exploited? | An incorrect configuration of the Webcart CGI program could disclose private information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0610",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0610",
"indicator": "CVE-1999-0610",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0610",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:mountain_network_systems:webcart:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:mountain_network_systems:webcart"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
},
{
"external_source": "",
"href": "http://marc.info/?l=bugtraq&m=92462991805485&w=2",
"type": null,
"tags": [],
"name": "19990420 Shopping Carts exposing CC data"
}
],
"description": "An incorrect configuration of the Webcart CGI program could disclose private information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-04-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0611 and related exploits. | A system-critical Windows NT registry key has an inappropriate value.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0611",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0611",
"indicator": "CVE-1999-0611",
"type_title": "CVE",
"base_indicator": {
"id": 2199218401,
"indicator": "CVE-1999-0611",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0611",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0611",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0611"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0611",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0611"
}
],
"description": "A system-critical Windows NT registry key has an inappropriate value.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0611. | A system-critical Windows NT registry key has an inappropriate value.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0611",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0611",
"indicator": "CVE-1999-0611",
"type_title": "CVE",
"base_indicator": {
"id": 2199218401,
"indicator": "CVE-1999-0611",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0611",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0611",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0611"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0611",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0611"
}
],
"description": "A system-critical Windows NT registry key has an inappropriate value.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0611 be exploited? | A system-critical Windows NT registry key has an inappropriate value.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0611",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0611",
"indicator": "CVE-1999-0611",
"type_title": "CVE",
"base_indicator": {
"id": 2199218401,
"indicator": "CVE-1999-0611",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0611",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0611",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0611"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0611",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0611"
}
],
"description": "A system-critical Windows NT registry key has an inappropriate value.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0612 and related exploits. | A version of finger is running that exposes valid user information to any entity on the network.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0612",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0612",
"indicator": "CVE-1999-0612",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0612",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:finger_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:gnu:fingerd",
"cpe:2.3:a:gnu:finger_service",
"cpe:2.3:o:microsoft:windows_nt",
"cpe:2.3:o:microsoft:windows_2000"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0612",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0612"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0612",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0612"
}
],
"description": "A version of finger is running that exposes valid user information to any entity on the network.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0612. | A version of finger is running that exposes valid user information to any entity on the network.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0612",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0612",
"indicator": "CVE-1999-0612",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0612",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:finger_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:gnu:fingerd",
"cpe:2.3:a:gnu:finger_service",
"cpe:2.3:o:microsoft:windows_nt",
"cpe:2.3:o:microsoft:windows_2000"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0612",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0612"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0612",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0612"
}
],
"description": "A version of finger is running that exposes valid user information to any entity on the network.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0612 be exploited? | A version of finger is running that exposes valid user information to any entity on the network.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0612",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0612",
"indicator": "CVE-1999-0612",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0612",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:gnu:finger_service:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:gnu:fingerd",
"cpe:2.3:a:gnu:finger_service",
"cpe:2.3:o:microsoft:windows_nt",
"cpe:2.3:o:microsoft:windows_2000"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0612",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0612"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0612",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0612"
}
],
"description": "A version of finger is running that exposes valid user information to any entity on the network.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-03-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0613 and related exploits. | The rpc.sprayd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0613",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0613",
"indicator": "CVE-1999-0613",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0613",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0613",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0613"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0613",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0613"
}
],
"description": "The rpc.sprayd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0613. | The rpc.sprayd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0613",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0613",
"indicator": "CVE-1999-0613",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0613",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0613",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0613"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0613",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0613"
}
],
"description": "The rpc.sprayd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0613 be exploited? | The rpc.sprayd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0613",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0613",
"indicator": "CVE-1999-0613",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0613",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0613",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0613"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0613",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0613"
}
],
"description": "The rpc.sprayd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0614 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0614",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0614",
"indicator": "CVE-1999-0614",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0614",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The FTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0614. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0614",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0614",
"indicator": "CVE-1999-0614",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0614",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The FTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0614 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0614",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0614",
"indicator": "CVE-1999-0614",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0614",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The FTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0615 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0615",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0615",
"indicator": "CVE-1999-0615",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0615",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SNMP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0615. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0615",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0615",
"indicator": "CVE-1999-0615",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0615",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SNMP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0615 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SNMP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0615",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0615",
"indicator": "CVE-1999-0615",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0615",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SNMP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0616 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0616",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0616",
"indicator": "CVE-1999-0616",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0616",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The TFTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0616. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0616",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0616",
"indicator": "CVE-1999-0616",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0616",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The TFTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0616 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The TFTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0616",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0616",
"indicator": "CVE-1999-0616",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0616",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The TFTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0617 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0617",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0617",
"indicator": "CVE-1999-0617",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0617",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SMTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0617. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0617",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0617",
"indicator": "CVE-1999-0617",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0617",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SMTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0617 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SMTP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0617",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0617",
"indicator": "CVE-1999-0617",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0617",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SMTP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0618 and related exploits. | The rexec service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0618",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0618",
"indicator": "CVE-1999-0618",
"type_title": "CVE",
"base_indicator": {
"id": 2199232275,
"indicator": "CVE-1999-0618",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0618",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0618",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0618"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0618",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0618"
}
],
"description": "The rexec service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0618. | The rexec service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0618",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0618",
"indicator": "CVE-1999-0618",
"type_title": "CVE",
"base_indicator": {
"id": 2199232275,
"indicator": "CVE-1999-0618",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0618",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0618",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0618"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0618",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0618"
}
],
"description": "The rexec service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0618 be exploited? | The rexec service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0618",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0618",
"indicator": "CVE-1999-0618",
"type_title": "CVE",
"base_indicator": {
"id": 2199232275,
"indicator": "CVE-1999-0618",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0618",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0618",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0618"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0618",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0618"
}
],
"description": "The rexec service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0619 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0619",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0619",
"indicator": "CVE-1999-0619",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0619",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The Telnet service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0619. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0619",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0619",
"indicator": "CVE-1999-0619",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0619",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The Telnet service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0619 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0619",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0619",
"indicator": "CVE-1999-0619",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0619",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The Telnet service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0620 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0620",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0620",
"indicator": "CVE-1999-0620",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0620",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NIS is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0620. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0620",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0620",
"indicator": "CVE-1999-0620",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0620",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NIS is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0620 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0620",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0620",
"indicator": "CVE-1999-0620",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0620",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NIS is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0621 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0621",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0621",
"indicator": "CVE-1999-0621",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0621",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NETBIOS is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0621. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0621",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0621",
"indicator": "CVE-1999-0621",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0621",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NETBIOS is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0621 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0621",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0621",
"indicator": "CVE-1999-0621",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0621",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to NETBIOS is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0622 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0622",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0622",
"indicator": "CVE-1999-0622",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0622",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to DNS service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0622. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0622",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0622",
"indicator": "CVE-1999-0622",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0622",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to DNS service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0622 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0622",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0622",
"indicator": "CVE-1999-0622",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0622",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A component service related to DNS service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0623 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0623",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0623",
"indicator": "CVE-1999-0623",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0623",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The X Windows service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0623. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0623",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0623",
"indicator": "CVE-1999-0623",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0623",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The X Windows service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0623 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0623",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0623",
"indicator": "CVE-1999-0623",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0623",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The X Windows service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0624 and related exploits. | The rstat/rstatd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0624",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0624",
"indicator": "CVE-1999-0624",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0624",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0624",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0624"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0624",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0624"
}
],
"description": "The rstat/rstatd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0624. | The rstat/rstatd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0624",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0624",
"indicator": "CVE-1999-0624",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0624",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0624",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0624"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0624",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0624"
}
],
"description": "The rstat/rstatd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0624 be exploited? | The rstat/rstatd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0624",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0624",
"indicator": "CVE-1999-0624",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0624",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0624",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0624"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0624",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0624"
}
],
"description": "The rstat/rstatd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0625 and related exploits. | The rpc.rquotad service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0625",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0625",
"indicator": "CVE-1999-0625",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0625",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0625",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0625"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0625",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0625"
}
],
"description": "The rpc.rquotad service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0625. | The rpc.rquotad service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0625",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0625",
"indicator": "CVE-1999-0625",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0625",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0625",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0625"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0625",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0625"
}
],
"description": "The rpc.rquotad service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0625 be exploited? | The rpc.rquotad service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0625",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0625",
"indicator": "CVE-1999-0625",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0625",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0625",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0625"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0625",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0625"
}
],
"description": "The rpc.rquotad service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0626 and related exploits. | A version of rusers is running that exposes valid user information to any entity on the network.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0626",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0626",
"indicator": "CVE-1999-0626",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0626",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:rpc.ruserd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:sun:rpc.ruserd"
],
"seen_wild": true,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0626",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0626"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0626",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0626"
}
],
"description": "A version of rusers is running that exposes valid user information to any entity on the network.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0626. | A version of rusers is running that exposes valid user information to any entity on the network.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0626",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0626",
"indicator": "CVE-1999-0626",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0626",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:rpc.ruserd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:sun:rpc.ruserd"
],
"seen_wild": true,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0626",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0626"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0626",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0626"
}
],
"description": "A version of rusers is running that exposes valid user information to any entity on the network.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0626 be exploited? | A version of rusers is running that exposes valid user information to any entity on the network.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0626",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0626",
"indicator": "CVE-1999-0626",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0626",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:sun:rpc.ruserd:*:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:a:sun:rpc.ruserd"
],
"seen_wild": true,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0626",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0626"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0626",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0626"
}
],
"description": "A version of rusers is running that exposes valid user information to any entity on the network.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0627 and related exploits. | The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0627",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0627",
"indicator": "CVE-1999-0627",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0627",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:ibm:aix:3.1",
"cpe:2.3:o:ibm:aix:3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627"
}
],
"description": "The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1992-03-01T05:00:00",
"exploits": [
{
"author": "CANVAS",
"cve": "CVE-1999-0627",
"description": "rexd",
"name": "rexd",
"url": "http://exploitlist.immunityinc.com/home/exploitpack/rexd/rexd"
}
],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0627. | The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0627",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0627",
"indicator": "CVE-1999-0627",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0627",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:ibm:aix:3.1",
"cpe:2.3:o:ibm:aix:3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627"
}
],
"description": "The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1992-03-01T05:00:00",
"exploits": [
{
"author": "CANVAS",
"cve": "CVE-1999-0627",
"description": "rexd",
"name": "rexd",
"url": "http://exploitlist.immunityinc.com/home/exploitpack/rexd/rexd"
}
],
"epss": null
} |
|
How can CVE CVE-1999-0627 be exploited? | The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0627",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0627",
"indicator": "CVE-1999-0627",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0627",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:ibm:aix:3.1",
"cpe:2.3:o:ibm:aix:3.2"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627"
}
],
"description": "The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1992-03-01T05:00:00",
"exploits": [
{
"author": "CANVAS",
"cve": "CVE-1999-0627",
"description": "rexd",
"name": "rexd",
"url": "http://exploitlist.immunityinc.com/home/exploitpack/rexd/rexd"
}
],
"epss": null
} |
|
Explain CVE CVE-1999-0628 and related exploits. | The rwho/rwhod service is running, which exposes machine status and user information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0628",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0628",
"indicator": "CVE-1999-0628",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0628",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:netbsd:netbsd:2.0.4",
"cpe:2.3:o:ibm:aix:4.2",
"cpe:2.3:o:freebsd:freebsd:6.2:stable",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628"
}
],
"description": "The rwho/rwhod service is running, which exposes machine status and user information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-07-01T04:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0628. | The rwho/rwhod service is running, which exposes machine status and user information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0628",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0628",
"indicator": "CVE-1999-0628",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0628",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:netbsd:netbsd:2.0.4",
"cpe:2.3:o:ibm:aix:4.2",
"cpe:2.3:o:freebsd:freebsd:6.2:stable",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628"
}
],
"description": "The rwho/rwhod service is running, which exposes machine status and user information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-07-01T04:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0628 be exploited? | The rwho/rwhod service is running, which exposes machine status and user information.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0628",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0628",
"indicator": "CVE-1999-0628",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0628",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "5.0",
"Confidentiality-Impact": "PARTIAL",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cwe": "NVD-CWE-Other",
"products": [
"cpe:2.3:o:netbsd:netbsd:2.0.4",
"cpe:2.3:o:ibm:aix:4.2",
"cpe:2.3:o:freebsd:freebsd:6.2:stable",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1"
],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628"
}
],
"description": "The rwho/rwhod service is running, which exposes machine status and user information.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1997-07-01T04:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0629 and related exploits. | The ident/identd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0629",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0629",
"indicator": "CVE-1999-0629",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0629",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629"
}
],
"description": "The ident/identd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0629. | The ident/identd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0629",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0629",
"indicator": "CVE-1999-0629",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0629",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629"
}
],
"description": "The ident/identd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0629 be exploited? | The ident/identd service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0629",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0629",
"indicator": "CVE-1999-0629",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0629",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629"
}
],
"description": "The ident/identd service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0630 and related exploits. | The NT Alerter and Messenger services are running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0630",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0630",
"indicator": "CVE-1999-0630",
"type_title": "CVE",
"base_indicator": {
"id": 2199228567,
"indicator": "CVE-1999-0630",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0630",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp",
"type": null,
"tags": [],
"name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp"
},
{
"external_source": "",
"href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp",
"type": null,
"tags": [],
"name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp"
}
],
"description": "The NT Alerter and Messenger services are running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0630. | The NT Alerter and Messenger services are running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0630",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0630",
"indicator": "CVE-1999-0630",
"type_title": "CVE",
"base_indicator": {
"id": 2199228567,
"indicator": "CVE-1999-0630",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0630",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp",
"type": null,
"tags": [],
"name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp"
},
{
"external_source": "",
"href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp",
"type": null,
"tags": [],
"name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp"
}
],
"description": "The NT Alerter and Messenger services are running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0630 be exploited? | The NT Alerter and Messenger services are running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0630",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0630",
"indicator": "CVE-1999-0630",
"type_title": "CVE",
"base_indicator": {
"id": 2199228567,
"indicator": "CVE-1999-0630",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0630",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp",
"type": null,
"tags": [],
"name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp"
},
{
"external_source": "",
"href": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp",
"type": null,
"tags": [],
"name": "http://support.microsoft.com/support/kb/articles/q189/2/71.asp"
}
],
"description": "The NT Alerter and Messenger services are running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0631 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0631",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0631",
"indicator": "CVE-1999-0631",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0631",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The NFS service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0631. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0631",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0631",
"indicator": "CVE-1999-0631",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0631",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The NFS service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0631 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0631",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0631",
"indicator": "CVE-1999-0631",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0631",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The NFS service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0632 and related exploits. | The RPC portmapper service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0632",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0632",
"indicator": "CVE-1999-0632",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0632",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0632",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0632"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0632",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0632"
}
],
"description": "The RPC portmapper service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0632. | The RPC portmapper service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0632",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0632",
"indicator": "CVE-1999-0632",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0632",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0632",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0632"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0632",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0632"
}
],
"description": "The RPC portmapper service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0632 be exploited? | The RPC portmapper service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0632",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0632",
"indicator": "CVE-1999-0632",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0632",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0632",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0632"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0632",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0632"
}
],
"description": "The RPC portmapper service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0633 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0633",
"indicator": "CVE-1999-0633",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0633",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The HTTP/WWW service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0633. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0633",
"indicator": "CVE-1999-0633",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0633",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The HTTP/WWW service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0633 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0633",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0633",
"indicator": "CVE-1999-0633",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0633",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The HTTP/WWW service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0634 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0634",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0634",
"indicator": "CVE-1999-0634",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0634",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SSH service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0634. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0634",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0634",
"indicator": "CVE-1999-0634",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0634",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SSH service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0634 be exploited? | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0634",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0634",
"indicator": "CVE-1999-0634",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0634",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"The SSH service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0635 and related exploits. | The echo service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0635",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0635",
"indicator": "CVE-1999-0635",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0635",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html",
"type": null,
"tags": [],
"name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services"
},
{
"external_source": "",
"href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html",
"type": null,
"tags": [],
"name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services"
},
{
"external_source": "",
"href": "http://secunia.com/advisories/18514",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "18514"
},
{
"external_source": "",
"href": "http://secunia.com/advisories/18514",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "18514"
}
],
"description": "The echo service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0635. | The echo service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0635",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0635",
"indicator": "CVE-1999-0635",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0635",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html",
"type": null,
"tags": [],
"name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services"
},
{
"external_source": "",
"href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html",
"type": null,
"tags": [],
"name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services"
},
{
"external_source": "",
"href": "http://secunia.com/advisories/18514",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "18514"
},
{
"external_source": "",
"href": "http://secunia.com/advisories/18514",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "18514"
}
],
"description": "The echo service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0635 be exploited? | The echo service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0635",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0635",
"indicator": "CVE-1999-0635",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0635",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html",
"type": null,
"tags": [],
"name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services"
},
{
"external_source": "",
"href": "http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html",
"type": null,
"tags": [],
"name": "20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services"
},
{
"external_source": "",
"href": "http://secunia.com/advisories/18514",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "18514"
},
{
"external_source": "",
"href": "http://secunia.com/advisories/18514",
"type": null,
"tags": [
"Vendor Advisory"
],
"name": "18514"
}
],
"description": "The echo service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0636 and related exploits. | The discard service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0636",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0636",
"indicator": "CVE-1999-0636",
"type_title": "CVE",
"base_indicator": {
"id": 2139718252,
"indicator": "CVE-1999-0636",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0636",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0636",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0636"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0636",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0636"
}
],
"description": "The discard service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0636. | The discard service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0636",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0636",
"indicator": "CVE-1999-0636",
"type_title": "CVE",
"base_indicator": {
"id": 2139718252,
"indicator": "CVE-1999-0636",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0636",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0636",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0636"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0636",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0636"
}
],
"description": "The discard service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0636 be exploited? | The discard service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0636",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0636",
"indicator": "CVE-1999-0636",
"type_title": "CVE",
"base_indicator": {
"id": 2139718252,
"indicator": "CVE-1999-0636",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0636",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0636",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0636"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0636",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0636"
}
],
"description": "The discard service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0637 and related exploits. | The systat service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0637",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0637",
"indicator": "CVE-1999-0637",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0637",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0637",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0637"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0637",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0637"
}
],
"description": "The systat service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0637. | The systat service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0637",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0637",
"indicator": "CVE-1999-0637",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0637",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0637",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0637"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0637",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0637"
}
],
"description": "The systat service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0637 be exploited? | The systat service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0637",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0637",
"indicator": "CVE-1999-0637",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0637",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0637",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0637"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0637",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0637"
}
],
"description": "The systat service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0638 and related exploits. | The daytime service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0638",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0638",
"indicator": "CVE-1999-0638",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0638",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0638",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0638"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0638",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0638"
}
],
"description": "The daytime service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0638. | The daytime service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0638",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0638",
"indicator": "CVE-1999-0638",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0638",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0638",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0638"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0638",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0638"
}
],
"description": "The daytime service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0638 be exploited? | The daytime service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0638",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0638",
"indicator": "CVE-1999-0638",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0638",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0638",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0638"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0638",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0638"
}
],
"description": "The daytime service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0639 and related exploits. | The chargen service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0639",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0639",
"indicator": "CVE-1999-0639",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0639",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0639",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0639"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0639",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0639"
}
],
"description": "The chargen service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0639. | The chargen service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0639",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0639",
"indicator": "CVE-1999-0639",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0639",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0639",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0639"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0639",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0639"
}
],
"description": "The chargen service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0639 be exploited? | The chargen service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0639",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0639",
"indicator": "CVE-1999-0639",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0639",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0639",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0639"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0639",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0639"
}
],
"description": "The chargen service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0640 and related exploits. | The Gopher service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0640",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0640",
"indicator": "CVE-1999-0640",
"type_title": "CVE",
"base_indicator": {
"id": 2199215609,
"indicator": "CVE-1999-0640",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0640",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0640",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0640"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0640",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0640"
}
],
"description": "The Gopher service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0640. | The Gopher service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0640",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0640",
"indicator": "CVE-1999-0640",
"type_title": "CVE",
"base_indicator": {
"id": 2199215609,
"indicator": "CVE-1999-0640",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0640",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0640",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0640"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0640",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0640"
}
],
"description": "The Gopher service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0640 be exploited? | The Gopher service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0640",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0640",
"indicator": "CVE-1999-0640",
"type_title": "CVE",
"base_indicator": {
"id": 2199215609,
"indicator": "CVE-1999-0640",
"type": "CVE",
"title": "",
"description": "",
"content": "",
"access_type": "public",
"access_reason": ""
},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0640",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "COMPLETE",
"Score": "10.0",
"Confidentiality-Impact": "COMPLETE",
"Integrity-Impact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0640",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0640"
},
{
"external_source": "",
"href": "https://www.cve.org/CVERecord?id=CVE-1999-0640",
"type": null,
"tags": [],
"name": "https://www.cve.org/CVERecord?id=CVE-1999-0640"
}
],
"description": "The Gopher service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0641 and related exploits. | The UUCP service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0641",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0641",
"indicator": "CVE-1999-0641",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0641",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641"
}
],
"description": "The UUCP service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0641. | The UUCP service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0641",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0641",
"indicator": "CVE-1999-0641",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0641",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641"
}
],
"description": "The UUCP service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
How can CVE CVE-1999-0641 be exploited? | The UUCP service is running.
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0641",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0641",
"indicator": "CVE-1999-0641",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0641",
"cvss": {
"Access-Complexity": "LOW",
"Access-Vector": "NETWORK",
"Authentication": "NONE",
"Availability-Impact": "NONE",
"Score": "0.0",
"Confidentiality-Impact": "NONE",
"Integrity-Impact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N"
},
"cvssv2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 0.0,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 0.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "NVD-CWE-Other",
"products": [],
"seen_wild": false,
"references": [
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641"
},
{
"external_source": "",
"href": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641",
"type": null,
"tags": [],
"name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641"
}
],
"description": "The UUCP service is running.",
"date_modified": "2024-11-20T23:29:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Explain CVE CVE-1999-0642 and related exploits. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0642",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0642",
"indicator": "CVE-1999-0642",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0642",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A POP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
|
Describe exploitation details for CVE CVE-1999-0642. | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running."
---
---
{
"sections": [
"general",
"nids_list",
"malware"
],
"mitre_url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-1999-0642",
"nvd_url": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0642",
"indicator": "CVE-1999-0642",
"type_title": "CVE",
"base_indicator": {},
"pulse_info": {
"count": 0,
"pulses": [],
"references": [],
"related": {
"alienvault": {
"adversary": [],
"malware_families": [],
"industries": []
},
"other": {
"adversary": [],
"malware_families": [],
"industries": []
}
}
},
"false_positive": [],
"cve": "CVE-1999-0642",
"cvss": {},
"cvssv2": {},
"cvssv3": {},
"configurations": {
"CVE_data_version": "4.0",
"nodes": []
},
"cwe": "",
"products": [],
"seen_wild": false,
"references": [],
"description": "Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: \"A POP service is running.",
"date_modified": "2023-11-07T01:54:00",
"date_created": "1999-01-01T05:00:00",
"exploits": [],
"epss": null
} |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.