CVE
stringlengths 13
16
| Description
stringlengths 20
3.95k
| KeyPhrases
stringlengths 2
343
|
---|---|---|
CVE-1999-0636
|
The discard service is running.
|
[]
|
CVE-1999-0637
|
The systat service is running.
|
[]
|
CVE-1999-0638
|
The daytime service is running.
|
[]
|
CVE-1999-0639
|
The chargen service is running.
|
[]
|
CVE-1999-0640
|
The Gopher service is running.
|
[]
|
CVE-1999-0641
|
The UUCP service is running.
|
[]
|
CVE-1999-0650
|
The netstat service is running, which provides sensitive information to remote attackers.
|
['sensitive information']
|
CVE-1999-0651
|
The rsh/rlogin service is running.
|
[]
|
CVE-1999-0653
|
A component service related to NIS+ is running.
|
[]
|
CVE-1999-0654
|
The OS/2 or POSIX subsystem in NT is enabled.
|
[]
|
CVE-1999-0656
|
The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
|
['specifying arbitrary UIDs', 'enumerate valid usernames by specifying arbitrary UIDs that', 'ugidd rpc interface']
|
CVE-1999-0657
|
WinGate is being used.
|
[]
|
CVE-1999-0661
|
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
|
[]
|
CVE-1999-0662
|
A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
|
[]
|
CVE-1999-0663
|
A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
|
['integrity']
|
CVE-1999-0664
|
An application-critical Windows NT registry key has inappropriate permissions.
|
['inappropriate permissions']
|
CVE-1999-0665
|
An application-critical Windows NT registry key has an inappropriate value.
|
['inappropriate value']
|
CVE-1999-0667
|
The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
|
['spoof ARP replies and poison the ARP cache', 'denial of service', 'spoofing']
|
CVE-1999-0668
|
The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
|
['execute arbitrary commands', 'execute arbitrary commands as demonstrated by Bubbleboy']
|
CVE-1999-0669
|
The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
|
['execute arbitrary commands', 'execute arbitrary commands as demonstrated by Bubbleboy']
|
CVE-1999-0670
|
Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands.
|
['execute arbitrary commands', 'buffer overflow']
|
CVE-1999-0671
|
Buffer overflow in ToxSoft NextFTP client through CWD command.
|
['buffer overflow']
|
CVE-1999-0672
|
Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics.
|
['buffer overflow']
|
CVE-1999-0673
|
Buffer overflow in ALMail32 POP3 client via From: or To: headers.
|
['buffer overflow']
|
CVE-1999-0674
|
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
|
['modify the internal data space of a program']
|
CVE-1999-0675
|
Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host.
|
['denial of service']
|
CVE-1999-0676
|
sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack.
|
['overwrite sensitive files via a symlink attack', 'sdtcm_convert']
|
CVE-1999-0677
|
The WebRamp web administration utility has a default password.
|
['default password']
|
CVE-1999-0678
|
A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
|
['read documentation files for the entire server']
|
CVE-1999-0679
|
Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option.
|
['execute commands via m_invite invite option', 'buffer overflow']
|
CVE-1999-0680
|
Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service.
|
['for a denial of service']
|
CVE-1999-0681
|
Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
|
['cause a denial of service via a long', 'buffer overflow']
|
CVE-1999-0682
|
Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled.
|
['relay email (i.e. spam) using encapsulated', 'encapsulated smtp addresses']
|
CVE-1999-0683
|
Denial of service in Gauntlet Firewall via a malformed ICMP packet.
|
['denial of service', 'malformed icmp packet']
|
CVE-1999-0684
|
Denial of service in Sendmail 8.8.6 in HPUX.
|
['denial of service']
|
CVE-1999-0685
|
Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option.
|
['buffer overflow']
|
CVE-1999-0686
|
Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL.
|
['denial of service', 'long url']
|
CVE-1999-0687
|
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
|
['execute commands', 'weak rpc authentication']
|
CVE-1999-0688
|
Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x.
|
['buffer overflows']
|
CVE-1999-0689
|
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
|
['execute arbitrary commands', 'execute arbitrary commands via a symlink attack']
|
CVE-1999-0690
|
HP CDE program includes the current directory in root's PATH variable.
|
[]
|
CVE-1999-0691
|
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
|
['gain root privileges', 'gain root privileges via a long user name', 'buffer overflow']
|
CVE-1999-0692
|
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
|
['gain root privileges']
|
CVE-1999-0693
|
Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
|
['gain root privileges', 'buffer overflow']
|
CVE-1999-0694
|
Denial of service in AIX ptrace system call allows local users to crash the system.
|
['crash the system', 'denial of service', 'crash system']
|
CVE-1999-0695
|
The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.
|
['read arbitrary files', 'read arbitrary files through a .. (dot', 'dot dot attack']
|
CVE-1999-0696
|
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
|
['buffer overflow']
|
CVE-1999-0697
|
SCO Doctor allows local users to gain root privileges through a Tools option.
|
['gain root privileges', 'gain root privileges through a Tools option']
|
CVE-1999-0698
|
Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux.
|
['denial of service']
|
CVE-1999-0699
|
The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.
|
['session hijacking via easily guessable session IDs', 'guessable session ids']
|
CVE-1999-0700
|
Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.
|
['buffer overflow']
|
CVE-1999-0701
|
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
|
['sensitive information']
|
CVE-1999-0702
|
Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
|
['modify or execute files via the Import/', 'importexportfavorites']
|
CVE-1999-0703
|
OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices.
|
['set chflags and fchflags on character and block']
|
CVE-1999-0704
|
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
|
['buffer overflow']
|
CVE-1999-0705
|
Buffer overflow in INN inews program.
|
['buffer overflow']
|
CVE-1999-0706
|
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
|
['gain root privileges', 'gain root privileges by modifying the IFS or']
|
CVE-1999-0707
|
The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization.
|
['send a file to other participants without authorization', 'ftp configuration']
|
CVE-1999-0708
|
Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field.
|
['gain root privileges', 'gain root privileges via a long GECOS field', 'buffer overflow']
|
CVE-1999-0710
|
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
|
['use it as an intermediary to connect to', 'public web directory']
|
CVE-1999-0711
|
The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root.
|
['execute Tcl commands as root']
|
CVE-1999-0712
|
A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable.
|
['be made world-readable']
|
CVE-1999-0713
|
The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.
|
['gain root privileges']
|
CVE-1999-0714
|
Vulnerability in Compaq Tru64 UNIX edauth command.
|
[]
|
CVE-1999-0715
|
Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.
|
['execute commands or cause a denial of service', 'buffer overflow']
|
CVE-1999-0716
|
Buffer overflow in Windows NT 4.0 help file utility via a malformed help file.
|
['buffer overflow']
|
CVE-1999-0717
|
A remote attacker can disable the virus warning mechanism in Microsoft Excel 97.
|
['virus warning mechanism']
|
CVE-1999-0718
|
IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key.
|
['gain administrator privileges', 'gain administrator privileges by changing the GroupMapping registry']
|
CVE-1999-0719
|
The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code.
|
['execute arbitrary code']
|
CVE-1999-0720
|
The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users.
|
['modify TTY terminal devices that belong to other']
|
CVE-1999-0721
|
Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request.
|
['denial of service', 'malformed lsa request']
|
CVE-1999-0722
|
The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages.
|
['install arbitrary software packages']
|
CVE-1999-0723
|
The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input.
|
['denial of service']
|
CVE-1999-0724
|
Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function.
|
['buffer overflow']
|
CVE-1999-0725
|
When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. "Double Byte Code Page".
|
['view the source code of certain files', 'double byte code page']
|
CVE-1999-0726
|
An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header.
|
['denial of service', 'malformed file image header']
|
CVE-1999-0727
|
A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted.
|
['be sent unencrypted', 'kernel leak']
|
CVE-1999-0728
|
A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them.
|
[]
|
CVE-1999-0729
|
Buffer overflow in Lotus Notes LDAP (NLDAP) allows an attacker to conduct a denial of service through the ldap_search request.
|
['conduct a denial of service through the ldap_search', 'buffer overflow']
|
CVE-1999-0730
|
The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack.
|
['overwrite files via a symlink attack']
|
CVE-1999-0731
|
The KDE klock program allows local users to unlock a session using malformed input.
|
['unlock a session using malformed input']
|
CVE-1999-0732
|
The logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files using symbolic links.
|
['delete arbitrary files', 'delete arbitrary files using symbolic links']
|
CVE-1999-0733
|
Buffer overflow in VMWare 1.0.1 for Linux via a long HOME environmental variable.
|
['buffer overflow']
|
CVE-1999-0734
|
A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication.
|
['modify the server database without authentication']
|
CVE-1999-0735
|
KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories.
|
['gain privileges', 'gain privileges via a symlink attack in temporary']
|
CVE-1999-0736
|
The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
|
['read arbitrary files']
|
CVE-1999-0737
|
The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
|
['read arbitrary files']
|
CVE-1999-0738
|
The code.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
|
['read arbitrary files']
|
CVE-1999-0739
|
The codebrws.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files.
|
['read arbitrary files']
|
CVE-1999-0740
|
Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable.
|
['denial of service', 'malformed term environmental variable']
|
CVE-1999-0741
|
QMS CrownNet Unix Utilities for 2060 allows root to log on without a password.
|
['log on without a password']
|
CVE-1999-0742
|
The Debian mailman package uses weak authentication, which allows attackers to gain privileges.
|
['gain privileges', 'weak authentication']
|
CVE-1999-0743
|
Trn allows local users to overwrite other users' files via symlinks.
|
["overwrite other users' files via symlinks"]
|
CVE-1999-0744
|
Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request.
|
['gain privileges', 'gain privileges via a long HTTP GET request', 'buffer overflow']
|
CVE-1999-0745
|
Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler.
|
['buffer overflow']
|
CVE-1999-0746
|
A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service.
|
['conduct a denial of service']
|
CVE-1999-0747
|
Denial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load.
|
['denial of service']
|
CVE-1999-0748
|
Buffer overflows in Red Hat net-tools package.
|
['buffer overflows']
|
CVE-1999-0749
|
Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument.
|
['buffer overflow']
|
CVE-1999-0750
|
Hotmail allows Javascript to be executed via the HTML STYLE tag, allowing remote attackers to execute commands on the user's Hotmail account.
|
['be executed via the HTML STYLE tag', "execute commands on the user's Hotmail account"]
|
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.