{"resultsPerPage":2000,"startIndex":0,"totalResults":346071,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-22T20:35:43.261","vulnerabilities":[{"cve":{"id":"CVE-1999-0095","sourceIdentifier":"cve@mitre.org","published":"1988-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The debug command in Sendmail is enabled, allowing attackers to execute commands as root."},{"lang":"es","value":"El comando de depuración de Sendmail está activado, permitiendo a atacantes ejecutar comandos como root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:5.58:*:*:*:*:*:*:*","matchCriteriaId":"1D07F493-9C8D-44A4-8652-F28B46CBA27C"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/195","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1","source":"cve@mitre.org"},{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/195","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0082","sourceIdentifier":"cve@mitre.org","published":"1988-11-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CWD ~root command in ftpd allows root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ftp:ftp:*:*:*:*:*:*:*:*","matchCriteriaId":"30D7F58F-4C55-4D19-984C-79B6C9525BEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:ftpcd:ftpcd:*:*:*:*:*:*:*:*","matchCriteriaId":"1D85A7F5-C187-4707-8681-F96A91F58318"}]}]}],"references":[{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"cve@mitre.org"},{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1471","sourceIdentifier":"cve@mitre.org","published":"1989-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in passwd in BSD based operating systems 4.3 and earlier allows local users to gain root privileges by specifying a long shell or GECOS field."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:4.2:*:*:*:*:*:*:*","matchCriteriaId":"32E0E862-63E6-42DA-8CCC-AAAC581FE211"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*","matchCriteriaId":"388BB5C2-53B3-4597-913C-7D86E585CCD5"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1989-01.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7152.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/4","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1989-01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7152.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/4","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1122","sourceIdentifier":"cve@mitre.org","published":"1989-07-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in restore in SunOS 4.0.3 and earlier allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.3","matchCriteriaId":"8ABF98B1-CBDE-4E12-8F3F-9D9E22E72236"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1989-02.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/ciac-08.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/3","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6695","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1989-02.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/ciac-08.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6695","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1467","sourceIdentifier":"cve@mitre.org","published":"1989-10-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in rcp on SunOS 4.0.x allows remote attackers from trusted hosts to execute arbitrary commands as root, possibly related to the configuration of the nobody user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1C25D2DE-7ED7-47E3-A49F-1F42B57500CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1989-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/5","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3165","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1989-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/5","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3165","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1506","sourceIdentifier":"cve@mitre.org","published":"1990-01-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in SMI Sendmail 4.0 and earlier, on SunOS up to 4.0.3, allows remote attackers to access user bin."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*","matchCriteriaId":"BDE2EAC5-0657-48FD-B4F8-D2DB6AABAE4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1C25D2DE-7ED7-47E3-A49F-1F42B57500CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-90.01.sun.sendmail.vulnerability","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/6","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-90.01.sun.sendmail.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/6","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0084","sourceIdentifier":"cve@mitre.org","published":"1990-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-269"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:nfs:*:*:*:*:*:*:*:*","matchCriteriaId":"A53226D2-00D1-4D69-AF1A-A9EBD5B7DE5F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/78","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0388","sourceIdentifier":"cve@mitre.org","published":"1990-05-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD libmytinfo library allows local users to execute commands via a long TERMCAP environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"}]}]}],"references":[{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A17.libmytinfo.asc","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1185","source":"cve@mitre.org"},{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00%3A17.libmytinfo.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1185","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0209","sourceIdentifier":"cve@mitre.org","published":"1990-08-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SunView (SunTools) selection_svc facility allows remote users to read files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*","matchCriteriaId":"BDE2EAC5-0657-48FD-B4F8-D2DB6AABAE4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1C25D2DE-7ED7-47E3-A49F-1F42B57500CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/8","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/8","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1198","sourceIdentifier":"cve@mitre.org","published":"1990-10-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BuildDisk program on NeXT systems before 2.0 does not prompt users for the root password, which allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0","matchCriteriaId":"AB5B9086-EC83-47C1-985A-7C088C84D858"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7141.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/11","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7141.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/11","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1391","sourceIdentifier":"cve@mitre.org","published":"1990-10-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in NeXT 1.0a and 1.0 with publicly accessible printers allows local users to gain privileges via a combination of the npd program and weak directory permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EB8A63B4-195D-4AF0-8FE9-EB882BFF098E"},{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:1.0a:*:*:*:*:*:*:*","matchCriteriaId":"CB1D6AD5-9F62-496F-BF5A-7AE26ABC3D3C"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7143.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/10","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7143.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/10","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1392","sourceIdentifier":"cve@mitre.org","published":"1990-10-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in restore0.9 installation script in NeXT 1.0a and 1.0 allows local users to gain root privileges."},{"lang":"es","value":"Vulnerabilidad en el script de instalación restore0.9  en  NeXT 1.0a y 1.0 permite a usuarios locales conseguir privilegios de root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:nex:1.0a:*:*:*:*:*:*:*","matchCriteriaId":"B477FD08-1821-4825-845F-954665A264AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EB8A63B4-195D-4AF0-8FE9-EB882BFF098E"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7144.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/9","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7144.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/9","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1057","sourceIdentifier":"cve@mitre.org","published":"1990-10-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"VMS 4.0 through 5.3 allows local users to gain privileges via the ANALYZE/PROCESS_DUMP dcl command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:vms:*:*:*:*:*:*:*:*","versionEndIncluding":"5.3","matchCriteriaId":"FC6FCF3E-910B-44F0-A946-BCC90308222E"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-04.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7137.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/12","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-04.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7137.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/12","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1554","sourceIdentifier":"cve@mitre.org","published":"1990-10-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"/usr/sbin/Mail on SGI IRIX 3.3 and 3.3.1 does not properly set the group ID to the group ID of the user who started Mail, which allows local users to read the mail of other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*","matchCriteriaId":"41D0212C-EA41-4DF3-9A93-4559545BCD7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"3567046C-FE3F-424D-A1B0-D7A43D00B79F"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1990-08.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3164.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/13","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1990-08.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3164.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/13","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1197","sourceIdentifier":"cve@mitre.org","published":"1990-12-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TIOCCONS in SunOS 4.1.1 does not properly check the permissions of a user who tries to redirect console output and input, which could allow a local user to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1990-12.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7140.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/14","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1990-12.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7140.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/14","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1115","sourceIdentifier":"cve@mitre.org","published":"1990-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the /etc/suid_exec program in HP Apollo Domain/OS sr10.2 and sr10.3 beta, related to the Korn Shell (ksh)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:apollo_domain_os:*:beta:*:*:*:*:*:*","versionEndIncluding":"sr10.3","matchCriteriaId":"F327CEF7-6EDD-4BA2-A60D-AC96588A824F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:apollo_domain_os:sr10.2:*:*:*:*:*:*:*","matchCriteriaId":"8B3564F9-ACAE-4E98-BE5D-912B257C93B1"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1990-04.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/a-30.shtml","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/6721.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/7","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1990-04.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/a-30.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/6721.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/7","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1258","sourceIdentifier":"cve@mitre.org","published":"1991-01-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.pwdauthd in SunOS 4.1.1 and earlier does not properly prevent remote access to the daemon, which allows remote attackers to obtain sensitive system information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.1","matchCriteriaId":"BD213C54-28D3-4584-95D2-E28732BC649A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/102","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1782","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/102","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1782","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1438","sourceIdentifier":"cve@mitre.org","published":"1991-02-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in /bin/mail in SunOS 4.1.1 and earlier allows local users to gain root privileges via certain command line arguments."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.1","matchCriteriaId":"BD213C54-28D3-4584-95D2-E28732BC649A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/105","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-91.01a.SunOS.mail.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/15","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/105","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-91.01a.SunOS.mail.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/15","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1211","sourceIdentifier":"cve@mitre.org","published":"1991-03-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in in.telnetd in SunOS 4.1.1 and earlier allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.1","matchCriteriaId":"BD213C54-28D3-4584-95D2-E28732BC649A"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1212","sourceIdentifier":"cve@mitre.org","published":"1991-03-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in in.rlogind in SunOS 4.0.3 and 4.0.3c allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-02.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/574","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1194","sourceIdentifier":"cve@mitre.org","published":"1991-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"chroot in Digital Ultrix 4.1 and 4.0 is insecurely installed, which allows local users to gain privileges."},{"lang":"es","value":"chroot en Digital Ultrix 4.1 y 4.0 es instalado de forma insegura, lo que permite a usuarios locales para ganar privilegios."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"18EE0235-30CD-4104-ADB8-45AA5B3CBC3A"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"0699893A-AE83-4605-BF2B-FC0C17BF2A69"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-05.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/17","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/577","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-05.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/17","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/577","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1193","sourceIdentifier":"cve@mitre.org","published":"1991-05-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The \"me\" user in NeXT NeXTstep 2.1 and earlier has wheel group privileges, which could allow the me user to use the su command to become root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1","matchCriteriaId":"ACE9BEA7-5F68-4861-B7F8-7C9A8889DBAB"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/20","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/581","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/20","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/581","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1123","sourceIdentifier":"cve@mitre.org","published":"1991-05-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation of Sun Source (sunsrc) tapes allows local users to gain root privileges via setuid root programs (1) makeinstall or (2) winstall."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/107&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1991-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/21","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/22","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/582","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/107&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1991-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/21","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/22","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/582","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1034","sourceIdentifier":"cve@mitre.org","published":"1991-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in login in AT&T System V Release 4 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:att:svr4:4.0:*:*:*:*:*:*:*","matchCriteriaId":"6F6554C4-666E-42A0-87B2-50F28CE58997"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-08.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/b-28.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/23","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/583","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-08.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/b-28.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/23","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/583","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1415","sourceIdentifier":"cve@mitre.org","published":"1991-08-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in /usr/bin/mail in DEC ULTRIX before 4.2 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"CFE03320-C658-48BC-93BA-B15DA5A29E3A"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-91.13.Ultrix.mail.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/27","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-91.13.Ultrix.mail.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/27","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1090","sourceIdentifier":"cve@mitre.org","published":"1991-09-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of NCSA Telnet package for Macintosh and PC enables FTP, even though it does not include an \"ftp=yes\" line, which allows remote attackers to read and modify arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:telnet:*:*:*:*:*:*:*:*","matchCriteriaId":"5CA584DD-D936-4EA3-A6E6-D39763480191"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-15.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1844","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-15.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1844","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0498","sourceIdentifier":"cve@mitre.org","published":"1991-09-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TFTP is not running in a restricted directory, allowing a remote attacker to access sensitive information such as password files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0498","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0498","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1468","sourceIdentifier":"cve@mitre.org","published":"1991-10-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rdist in various UNIX systems uses popen to execute sendmail, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:2.0:*:*:*:*:*:*:*","matchCriteriaId":"EE2FFB2A-88AD-483E-ABE8-38655528F081"},{"vulnerable":true,"criteria":"cpe:2.3:a:next:next:2.1:*:*:*:*:*:*:*","matchCriteriaId":"4BB7B0B4-2E69-434C-BB18-4400001A9CBC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*","matchCriteriaId":"41D0212C-EA41-4DF3-9A93-4559545BCD7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"3567046C-FE3F-424D-A1B0-D7A43D00B79F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*","matchCriteriaId":"40511481-CD42-4EB7-BE2A-7A78964B7D3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*","matchCriteriaId":"D926CDA1-AF2B-4DED-93AE-8F12091E0B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"536CB843-5FF6-4BC1-A6DA-92A8CB69D6D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.0:*:*:*:*:*:*:*","matchCriteriaId":"3E7725DD-085A-4D3A-8F9E-55C3D4BBDD1B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.0e:*:*:*:*:*:*:*","matchCriteriaId":"544736F7-0E4F-45C1-811B-114CFCBBC895"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACCD6F58-9E37-40F0-AFD5-49523BEA301E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1psr_a:*:*:*:*:*:*:*","matchCriteriaId":"FF90C17C-5B10-45D4-8296-D00EAFA1EB8E"}]}]}],"references":[{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-91.20.rdist.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7160.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8106","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/31","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-01.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-91.20.rdist.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7160.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8106","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/31","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0167","sourceIdentifier":"cve@mitre.org","published":"1991-12-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In SunOS, NFS file handles could be guessed, giving unauthorized access to the exported file system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0167","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0167","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1493","sourceIdentifier":"cve@mitre.org","published":"1991-12-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in crp in Hewlett Packard Apollo Domain OS SR10 through SR10.3 allows remote attackers to gain root privileges via insecure system calls, (1) pad_$dm_cmd and (2) pad_$def_pfk()."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:apollo_domain_os:*:*:*:*:*:*:*:*","versionEndIncluding":"sr10.3","matchCriteriaId":"976B0F09-89B1-45AA-A8F2-CA473ECDB300"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1991-23.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/34","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7158","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-23.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/34","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7158","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1032","sourceIdentifier":"cve@mitre.org","published":"1991-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in LAT/Telnet Gateway (lattelnet) on Ultrix 4.1 and 4.2 allows attackers to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"0699893A-AE83-4605-BF2B-FC0C17BF2A69"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"08B83DF0-860D-4A8C-ACA7-A1A68D81B8DB"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-36.shtml","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1991-11.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/26","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/584","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-36.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1991-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/26","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/584","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1059","sourceIdentifier":"cve@mitre.org","published":"1992-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in rexec daemon (rexecd) in AT&T TCP/IP 4.0 for various SVR4 systems allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:att:svr4:4.0:*:*:*:*:*:*:*","matchCriteriaId":"6F6554C4-666E-42A0-87B2-50F28CE58997"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-04.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3159.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/36","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-04.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/3159.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/36","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0627","sourceIdentifier":"cve@mitre.org","published":"1992-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rexd service is running, which uses weak authentication that can allow an attacker to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The rexd service is an unsecured protocol for Internet facing systems and should only be used on a trusted network segment, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-1121","sourceIdentifier":"cve@mitre.org","published":"1992-03-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration for UUCP in AIX before 3.2 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2","matchCriteriaId":"7984C6CE-B4DB-4863-93FB-799BD0BE589A"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-06.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/891","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/38","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/554","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/891","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/38","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/554","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0117","sourceIdentifier":"cve@mitre.org","published":"1992-03-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX passwd allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0117","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0117","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1119","sourceIdentifier":"cve@mitre.org","published":"1992-04-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTP installation script anon.ftp in AIX insecurely configures anonymous FTP, which allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:32-bit:*:*:*:*:*","matchCriteriaId":"EA45EFBA-7900-4277-9177-2D2A8316577D"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-09.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/41","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3154","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-09.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/41","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3154","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1142","sourceIdentifier":"cve@mitre.org","published":"1992-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SunOS 4.1.2 and earlier allows local users to gain privileges via \"LD_*\" environmental variables to certain dynamically linked setuid or setgid programs such as (1) login, (2) su, or (3) sendmail, that change the real and effective user ids to the same user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.2","matchCriteriaId":"B756EC9D-B72C-4A5F-9C17-A2F73583B7D2"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-11.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3152","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/116","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1992-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3152","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0168","sourceIdentifier":"cve@mitre.org","published":"1992-06-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The portmapper may act as a proxy and redirect service requests from an attacker, making the request appear to come from the local host, possibly bypassing authentication that would otherwise have taken place.  For example, NFS file systems could be mounted through the portmapper despite export restrictions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0168","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0168","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0214","sourceIdentifier":"cve@mitre.org","published":"1992-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service by sending forged ICMP unreachable packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0214","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0214","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1396","sourceIdentifier":"cve@mitre.org","published":"1992-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in integer multiplication emulation code on SPARC architectures for SunOS 4.1 through 4.1.2 allows local users to gain root access or cause a denial of service (crash)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7150.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/49","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7150.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/49","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1395","sourceIdentifier":"cve@mitre.org","published":"1992-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Monitor utility (SYS$SHARE:SPISHR.EXE) in VMS 5.0 through 5.4-2 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0:*:*:*:*:*:*:*","matchCriteriaId":"1D42E089-9EE8-4B4E-8B25-20F54DA4D01A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D2BFC6C5-9A3A-4A12-B7FD-095FD00DB89A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"8E8B4954-4B16-47D7-9BC2-49E8CE34BC31"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1:*:*:*:*:*:*:*","matchCriteriaId":"BFB8258A-966B-4E25-9824-1A73F1AEF265"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"EC967A85-49C7-4F1E-912F-E63363355ED3"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1.2:*:*:*:*:*:*:*","matchCriteriaId":"00A32138-FC94-4AE6-A0E8-B359F15CFC37"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.1b:*:*:*:*:*:*:*","matchCriteriaId":"3B94A8E5-1BC9-42AC-9176-7270352C1275"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.2:*:*:*:*:*:*:*","matchCriteriaId":"1E3CA2B4-63C9-4BBB-AD43-B54AEDB2039D"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.2.1:*:*:*:*:*:*:*","matchCriteriaId":"855536B6-B857-4721-BC1C-07FF6F309F34"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3:*:*:*:*:*:*:*","matchCriteriaId":"DF157514-2080-4A16-BEBA-AFF6FCEE52E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"93468C27-04EC-4C81-816E-2E44D2C9372C"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.3.2:*:*:*:*:*:*:*","matchCriteriaId":"C0B611AE-9581-41E5-8AD8-7876EAA730A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4:*:*:*:*:*:*:*","matchCriteriaId":"74642EFA-4E4B-4BA9-A1AA-5CF4DD659A1A"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4.1:*:*:*:*:*:*:*","matchCriteriaId":"3A418295-3389-40B9-9D96-5DE7B720D12B"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:5.4.2:*:*:*:*:*:*:*","matchCriteriaId":"178FBBB2-222C-4456-835E-2CFD94222154"}]}]}],"references":[{"url":"http://osvdb.org/59332","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-18.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-92.16.VMS.Monitor.vulnerability","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7136.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/51","source":"cve@mitre.org"},{"url":"http://osvdb.org/59332","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1992-18.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-92.16.VMS.Monitor.vulnerability","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7136.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/51","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1306","sourceIdentifier":"cve@mitre.org","published":"1992-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco IOS 9.1 and earlier does not properly handle extended IP access lists when the IP route cache is enabled and the \"established\" keyword is set, which could allow attackers to bypass filters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*","versionEndIncluding":"9.1","matchCriteriaId":"91986F0D-94E5-4ED9-A98D-123C99FD43CE"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]}]}},{"cve":{"id":"CVE-1999-1466","sourceIdentifier":"cve@mitre.org","published":"1992-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Cisco routers versions 8.2 through 9.1 allows remote attackers to bypass access control lists when extended IP access lists are used on certain interfaces, the IP route cache is enabled, and the access list uses the \"established\" keyword."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:8.2:*:*:*:*:*:*:*","matchCriteriaId":"E72B3032-154D-45C2-8380-CCB28E4F2E8C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:8.3:*:*:*:*:*:*:*","matchCriteriaId":"87395248-5E9C-4257-9CC7-2E2805B69F83"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:9.0:*:*:*:*:*:*:*","matchCriteriaId":"A476BFB0-E587-41A6-B691-2609E0146C2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*","matchCriteriaId":"2E9A00D5-A594-4C64-B982-10CB4C554F51"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/53","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1992-20.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/53","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1021","sourceIdentifier":"cve@mitre.org","published":"1992-12-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NFS on SunOS 4.1 through 4.1.2 ignores the high order 16 bits in a 32 bit UID, which allows a local user to gain root access if the lower 16 bits are set to 0, as fixed by the NFS jumbo patch upgrade."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/117&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/47","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/117&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.cert.org/advisories/CA-1992-15.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/47","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/82","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1056","sourceIdentifier":"cve@mitre.org","published":"1992-12-31T05:00:00.000","lastModified":"2023-11-07T01:55:06.290","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-1395.  Reason: This candidate is a duplicate of CVE-1999-1395.  Notes: All CVE users should reference CVE-1999-1395 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-0312","sourceIdentifier":"cve@mitre.org","published":"1993-01-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP ypbind allows attackers with root privileges to modify NIS data."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0312","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0312","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1507","sourceIdentifier":"cve@mitre.org","published":"1993-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sun SunOS 4.1 through 4.1.3 allows local attackers to gain root access via insecure permissions on files and directories such as crash."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1psr_a:*:*:*:*:*:*:*","matchCriteriaId":"FF90C17C-5B10-45D4-8296-D00EAFA1EB8E"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-03.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/59","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/521","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-03.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/59","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/521","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1218","sourceIdentifier":"cve@mitre.org","published":"1993-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in finger in Commodore Amiga UNIX 2.1p2a and earlier allows local users to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:commodore:amiga_unix:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1p2a","matchCriteriaId":"86CE2F2F-EB73-42C3-9341-9E0F363C2016"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-04.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/522","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-04.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/522","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1312","sourceIdentifier":"cve@mitre.org","published":"1993-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in DEC OpenVMS VAX 5.5-2 through 5.0, and OpenVMS AXP 1.0, allows local users to gain system privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms_axp:1.0:*:*:*:*:*:*:*","matchCriteriaId":"F14BE7DD-8FE0-47DC-929A-35F20D9E3CE2"},{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms_vax:*:*:*:*:*:*:*:*","versionEndIncluding":"5.5.2","matchCriteriaId":"52FE6481-1AEF-4C90-800C-AB5C4FB34344"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-05.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7142","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-05.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7142","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1216","sourceIdentifier":"cve@mitre.org","published":"1993-04-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco routers 9.17 and earlier allow remote attackers to bypass security restrictions via certain IP source routed packets that should normally be denied using the \"no ip source-route\" command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*","versionEndIncluding":"9.17","matchCriteriaId":"990D0766-8FDF-43A0-B46C-09F2E75B4760"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:8.2:*:*:*:*:*:*:*","matchCriteriaId":"70C8F944-01A5-45E8-B963-E68B85F86165"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:8.3:*:*:*:*:*:*:*","matchCriteriaId":"DE7D0623-0F18-4486-B4DF-B49635A70EDF"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:9.0:*:*:*:*:*:*:*","matchCriteriaId":"9EA7D7D0-B445-4F24-A86E-569291EA2456"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:9.1:*:*:*:*:*:*:*","matchCriteriaId":"27604364-99CA-4942-ABCD-8F2B4CB20092"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/d-15.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1993-07.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/541","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/d-15.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1993-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/541","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1162","sourceIdentifier":"cve@mitre.org","published":"1993-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in passwd in SCO UNIX 4.0 and earlier allows attackers to cause a denial of service by preventing users from being able to log into the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:1.1:*:*:*:*:*:*:*","matchCriteriaId":"45809A38-B903-49CF-835A-A678A840B14D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"AB0CCDB1-0D44-4868-8CD6-7EACE691E1C2"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-08.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/542.php","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-08.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/542.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0124","sourceIdentifier":"cve@mitre.org","published":"1993-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_minnesota:gopherd:*:*:*:*:*:*:*:*","matchCriteriaId":"B2332AA3-6412-470A-A321-91EE3B95325F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0124","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0124","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1215","sourceIdentifier":"cve@mitre.org","published":"1993-09-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.0:*:*:*:*:*:*:*","matchCriteriaId":"98DA9E1F-E489-4D63-9CCA-6C011E6B08C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.01:*:*:*:*:*:*:*","matchCriteriaId":"76536FFE-4745-4F8D-A1E3-337FF5ED1F20"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/d-21.shtml","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-12.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/545","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/d-21.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1993-12.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/545","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1138","sourceIdentifier":"cve@mitre.org","published":"1993-09-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SCO UNIX System V/386 Release 3.2, and other SCO products, installs the home directories (1) /tmp for the dos user, and (2) /usr/tmp for the asg user, which allows other users to gain access to those accounts since /tmp and /usr/tmp are world-writable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4624BE70-B14C-470A-B0ED-133FAE688882"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7363FF35-7C67-40DC-AD38-74FD6264BF5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system:*:*:*:*:*:*:*","matchCriteriaId":"BFE6762F-886D-4FC9-8AE5-C462BF42E403"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_2.0:*:*:*:*:*:*:*","matchCriteriaId":"02948256-49AE-415E-8B64-27DA246B7A57"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.0:*:*:*:*:*:*:*","matchCriteriaId":"1005628A-0E07-485C-9E88-353A86E83BD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:system_v386_3.2_operating_system_4.x:*:*:*:*:*:*:*","matchCriteriaId":"207FB7B7-C6FF-4D9F-9E6D-34E6CF7E2146"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1993-13.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/546","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1993-13.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/546","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1318","sourceIdentifier":"cve@mitre.org","published":"1993-09-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"/usr/5bin/su in SunOS 4.1.3 and earlier uses a search path that includes the current working directory (.), which allows local users to gain privileges via Trojan horse programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.3","matchCriteriaId":"EB4CA8D0-B4E3-4B4E-A7D0-771B5C405004"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7480.php","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100630&zone_32=112193%2A%20","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7480.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0145","sourceIdentifier":"cve@mitre.org","published":"1993-09-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail WIZ command enabled, allowing root access."},{"lang":"es","value":"Sendmail WIZ comando  habilitado, permite el acceso de root"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:*:*:*:*:*:*:*:*","matchCriteriaId":"887964FC-405F-40DB-B848-806748BA6FE8"}]}]}],"references":[{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"cve@mitre.org"},{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1990-11.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1993-14.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"cve@mitre.org"},{"url":"http://www2.dataguard.no/bugtraq/1995_1/0332.html","source":"cve@mitre.org"},{"url":"http://seclists.org/fulldisclosure/2019/Jun/16","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1990-11.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1993-14.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.openwall.com/lists/oss-security/2019/06/05/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2019/06/06/1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www2.dataguard.no/bugtraq/1995_1/0332.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1137","sourceIdentifier":"cve@mitre.org","published":"1993-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The permissions for the /dev/audio device on Solaris 2.2 and earlier, and SunOS 4.1.x, allow any local user to read from the device, which could be used by an attacker to monitor conversations happening near a machine that has a microphone."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*","matchCriteriaId":"469B74F2-4B89-42B8-8638-731E92D463B9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"5.2","matchCriteriaId":"672DD6BA-F3B2-4F1A-BA2C-0DA68A47853A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/e-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/6436","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/549","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/e-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/6436","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/549","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0334","sourceIdentifier":"cve@mitre.org","published":"1993-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Solaris 2.2 and 2.3, when fsck fails on startup, it allows a local user with physical access to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*","matchCriteriaId":"FEEC0C5A-4A6E-403C-B929-D1EC8B0FE2A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0334","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0334","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0181","sourceIdentifier":"cve@mitre.org","published":"1994-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:P/A:P","baseScore":6.8,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rpc.walld:rpc.walld:*:*:*:*:*:*:*:*","matchCriteriaId":"68788632-AEEA-40AF-B3EA-B2B1AB3928A2"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0181","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0181","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1242","sourceIdentifier":"cve@mitre.org","published":"1994-02-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"}]}]}],"references":[{"url":"http://packetstormsecurity.org/advisories/hpalert/003","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2162","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/advisories/hpalert/003","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2162","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0211","sourceIdentifier":"cve@mitre.org","published":"1994-02-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Extra long export lists over 256 characters in some mount daemons allows NFS directories to be mounted by anyone."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/24","source":"cve@mitre.org"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=96665790","source":"cve@mitre.org"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124517","source":"cve@mitre.org"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124527","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/24","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=96665790","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124517","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://vuls.cert.org/confluence/pages/viewpage.action?pageId=97124527","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0338","sourceIdentifier":"cve@mitre.org","published":"1994-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX Licensed Program Product performance tools allow local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0338","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0338","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0120","sourceIdentifier":"cve@mitre.org","published":"1994-03-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/126","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/126","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1135","sourceIdentifier":"cve@mitre.org","published":"1994-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in VUE 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4994 and PHSS_5438."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://packetstorm.securify.com/advisories/hpalert/027","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2284","source":"cve@mitre.org"},{"url":"http://packetstorm.securify.com/advisories/hpalert/027","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2284","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1146","sourceIdentifier":"cve@mitre.org","published":"1994-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Glance and gpm programs in GlancePlus for HP-UX 9.x and earlier allows local users to access arbitrary files and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"9","matchCriteriaId":"22CDE177-1414-45C9-835C-FD15A0B9FC9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*","matchCriteriaId":"19587780-3515-484C-BCB4-F2BB90106C5C"}]}]}],"references":[{"url":"http://www.securityfocus.com/advisories/1555","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2060","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/advisories/1555","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2060","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1388","sourceIdentifier":"cve@mitre.org","published":"1994-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"passwd in SunOS 4.1.x allows local users to overwrite arbitrary files via a symlink attack and the -F command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"}]}]}],"references":[{"url":"http://www.dataguard.no/bugtraq/1994_4/0755.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0197.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0207.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.dataguard.no/bugtraq/1994_4/0755.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0197.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www2.dataguard.no/bugtraq/1994_2/0207.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}},{"cve":{"id":"CVE-1999-1134","sourceIdentifier":"cve@mitre.org","published":"1994-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Vue 3.0 in HP 9.x allows local users to gain root privileges, as fixed by PHSS_4038, PHSS_4055, and PHSS_4066."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/e-23.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://packetstorm.securify.com/advisories/hpalert/008","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/2284.php","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/e-23.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://packetstorm.securify.com/advisories/hpalert/008","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/2284.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0113","sourceIdentifier":"cve@mitre.org","published":"1994-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some implementations of rlogin allow root access if given a -froot parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-88"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/458","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/458","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0423","sourceIdentifier":"cve@mitre.org","published":"1994-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in hpterm on HP-UX 10.20 allows local users to gain additional privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-093","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-093","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0337","sourceIdentifier":"cve@mitre.org","published":"1994-06-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX batch queue (bsh) allows local and remote users to gain additional privileges when network printing is enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"73CE931A-1500-4450-B65A-591CAA3225AB"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:1.3:*:*:*:*:*:*:*","matchCriteriaId":"5F40A32B-3EF8-41D4-B6EC-3DC82D550365"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"28B1C99E-D05A-4778-8650-39B63CC8B2F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0337","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0337","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0207","sourceIdentifier":"cve@mitre.org","published":"1994-06-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attacker can execute commands through Majordomo using the Reply-To field and a \"lists\" command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:1.90:*:*:*:*:*:*:*","matchCriteriaId":"31B44E23-8964-4BE4-9F22-2C7AB0C2F682"},{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:1.91:*:*:*:*:*:*:*","matchCriteriaId":"E6D374F2-8551-4B44-BA96-B7D1F44920D5"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0207","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0207","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1239","sourceIdentifier":"cve@mitre.org","published":"1994-07-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP-UX 9.x does not properly enable the Xauthority mechanism in certain conditions, which could allow local users to access the X display even when they have not explicitly been authorized to do so."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://www.securityfocus.com/advisories/1559","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2261","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/advisories/1559","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2261","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1552","sourceIdentifier":"cve@mitre.org","published":"1994-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dpsexec (DPS Server) when running under XDM in IBM AIX 3.2.5 and earlier does not properly check privileges, which allows local users to overwrite arbitrary files and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2.5","matchCriteriaId":"AEC519E8-F10E-4B51-A7AB-BF4109F91393"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"}]}]}],"references":[{"url":"http://lists.insecure.org/lists/bugtraq/1994/Jul/0038.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/358","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://lists.insecure.org/lists/bugtraq/1994/Jul/0038.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/358","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1494","sourceIdentifier":"cve@mitre.org","published":"1994-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"colorview in Silicon Graphics IRIX 5.1, 5.2, and 6.0 allows local attackers to read arbitrary files via the -text argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950209-01-P","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/675","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/336","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.tryc.on.ca/archives/bugtraq/1995_1/0614.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2112","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950209-01-P","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/675","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/336","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.tryc.on.ca/archives/bugtraq/1995_1/0614.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2112","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1219","sourceIdentifier":"cve@mitre.org","published":"1994-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in sgihelp in the SGI help system and print manager in IRIX 5.2 and earlier allows local users to gain root privileges, possibly through the clogin command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/e-33.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1994-13.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/468","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/511","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/e-33.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1994-13.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/468","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/511","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1238","sourceIdentifier":"cve@mitre.org","published":"1994-09-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in CORE-DIAG fileset in HP message catalog in HP-UX 9.05 and earlier allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"9.05","matchCriteriaId":"DBF5B8E5-8CFA-4D46-A67A-13FA4033F1DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*","matchCriteriaId":"19587780-3515-484C-BCB4-F2BB90106C5C"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://www.securityfocus.com/advisories/1531","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2262","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/advisories/1531","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2262","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1022","sourceIdentifier":"cve@mitre.org","published":"1994-10-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"serial_ports administrative program in IRIX 4.x and 5.x trusts the user's PATH environmental variable to find and execute the ls program, which allows local users to gain root privileges via a Trojan horse ls program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4:*:*:*:*:*:*:*","matchCriteriaId":"C6AACDE0-00BA-4A29-8305-5AA0A4BC273C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/930","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/464","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2111","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/930","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/464","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2111","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1310","sourceIdentifier":"cve@mitre.org","published":"1994-11-04T05:00:00.000","lastModified":"2023-11-07T01:55:08.250","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-1022.  Reason: This candidate is a duplicate of CVE-1999-1022.  Notes: All CVE users should reference CVE-1999-1022 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-1248","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Support Watch (aka SupportWatch) in HP-UX 8.0 through 9.0 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"9.00","matchCriteriaId":"1626B849-4E5A-4431-8651-74B75F61010E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*","matchCriteriaId":"A573388D-BD8F-48D3-8BA9-E4D11402CA22"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*","matchCriteriaId":"6973B4FC-8009-4336-BED4-7B032EA1E570"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*","matchCriteriaId":"D0EB2E93-9774-442C-BB60-E428F53EE6F4"}]}]}],"references":[{"url":"http://packetstormsecurity.org/advisories/hpalert/019","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2058","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/advisories/hpalert/019","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2058","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1302","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in pt_chmod in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8797","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7586","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ftp.cerias.purdue.edu/pub/advisories/cert/cert_bulletins/VB-94:01.sco","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8797","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7586","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1303","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in prwarn in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1304","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in login in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1305","sourceIdentifier":"cve@mitre.org","published":"1994-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in \"at\" program in SCO UNIX 4.2 and earlier allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop_lite:3.0:*:*:*:*:*:*:*","matchCriteriaId":"E1DFB7EF-5D8E-4BA9-A543-3997FA4DC433"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"456818AD-1B4C-4FE5-AE2E-5D8253CDC2DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_network_system:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D5896E82-2CE0-41E1-B362-4AF7F760F7DC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"109E66CC-D6A2-401C-A78F-7670DA0BF790"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"C7704187-37B1-454B-A928-257D401819BE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4CBA0A34-C963-4A7A-ABDF-5EA7A02FDBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FA09A1EF-E03D-452E-AA80-0D8F294449FC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-05.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0508","sourceIdentifier":"cve@mitre.org","published":"1994-12-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.lockd in Red Hat Linux 6.1 and 6.2 allows remote attackers to cause a denial of service via a malformed request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"D323A6B7-2741-4F31-B0D6-5D6FB738A2A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACAAD334-2CA7-4B3B-BA25-302E7610BC2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"E4853E92-5E0A-47B9-A343-D5BEE87D2C27"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0633B5A6-7A88-4A96-9462-4C09D124ED36"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0073.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1372","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5050","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0073.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1372","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5050","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0077","sourceIdentifier":"cve@mitre.org","published":"1995-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Predictable TCP sequence numbers allow spoofing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/139","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/139","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0232","sourceIdentifier":"cve@mitre.org","published":"1995-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NCSA WebServer (version 1.5c) gives remote access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa_httpd_project:ncsa_httpd:1.5c:*:*:*:*:*:*:*","matchCriteriaId":"BB92CBD1-8E7C-4DAC-9FA5-D04643F62D98"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0232","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0232","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0235","sourceIdentifier":"cve@mitre.org","published":"1995-02-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NCSA WebServer (1.4.1 and below) gives remote access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_web_server:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7BB3C7C7-F1F0-4161-8223-631764802083"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_web_server:1.4:*:*:*:*:*:*:*","matchCriteriaId":"D3282BD0-E5F4-49BA-81C8-16A8AF9C37A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_web_server:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"64E14B51-26DF-496D-BEAA-82AA3FF90E43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0235","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0235","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0242","sourceIdentifier":"cve@mitre.org","published":"1995-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can access mail files via POP3 in some Linux systems that are using shadow passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:*:*:*:*:*:*:*:*","matchCriteriaId":"F432C6C2-8676-4DD5-B9E6-71F6C164EF9D"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0242","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0242","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1098","sourceIdentifier":"cve@mitre.org","published":"1995-03-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in BSD Telnet client with encryption and Kerberos 4 authentication allows remote attackers to decrypt the session via sniffing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:*:*:*:*:*:*:*:*","matchCriteriaId":"B44D379F-F380-42EC-9C9A-A4C8314A4BDF"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1995-03.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/f-12.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/516.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4881","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1995-03.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/f-12.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/516.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4881","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1243","sourceIdentifier":"cve@mitre.org","published":"1995-03-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI Desktop Permissions Tool in IRIX 6.0.1 and earlier allows local users to modify permissions for arbitrary files and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0.1","matchCriteriaId":"FE16D86A-0C84-4B36-90B0-F5F10B6146D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-16.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2113","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19950301-01-P373","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-16.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2113","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0151","sourceIdentifier":"cve@mitre.org","published":"1995-04-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SATAN session key may be disclosed if the user points the web browser to other sites, possibly allowing root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:satan:satan:1.0:*:*:*:*:*:*:*","matchCriteriaId":"8DBA66ED-1AF6-4B47-B3B9-797F59E6A82E"},{"vulnerable":true,"criteria":"cpe:2.3:a:satan:satan:1.1:*:*:*:*:*:*:*","matchCriteriaId":"78F5F86B-37D8-468B-8F21-3B58DF7F77D4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0151","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0151","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1080","sourceIdentifier":"cve@mitre.org","published":"1995-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92633694100270&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93971288323395&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/250","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8350","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92633694100270&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93971288323395&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/250","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8350","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0066","sourceIdentifier":"cve@mitre.org","published":"1995-07-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AnyForm CGI remote execution."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:john_s._roberts:anyform:1.0:*:*:*:*:*:*:*","matchCriteriaId":"86BFFC62-5EFC-496E-82AE-6D59E4D9DB08"},{"vulnerable":true,"criteria":"cpe:2.3:a:john_s._roberts:anyform:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DBED7446-4A8B-4688-8479-1737CD19770E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/719","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/719","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0161","sourceIdentifier":"cve@mitre.org","published":"1995-07-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Cisco IOS 10.3, with the tacacs-ds or tacacs keyword, an extended IP access control list could bypass filtering."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:10.3\\(3.4\\):*:*:*:*:*:*:*","matchCriteriaId":"630947E3-6D04-4A99-AAB3-B988BD513885"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:10.3\\(4.2\\):*:*:*:*:*:*:*","matchCriteriaId":"850D8A04-E853-4570-A81D-EC053C47BB4B"}]}]}],"references":[{"url":"http://www.osvdb.org/797","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/797","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0172","sourceIdentifier":"cve@mitre.org","published":"1995-08-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FormMail CGI program allows remote execution of commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formmail:*:*:*:*:*:*:*:*","matchCriteriaId":"0D0DEA87-03B6-4290-ACE7-C5A19F68543B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0172","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0172","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0203","sourceIdentifier":"cve@mitre.org","published":"1995-08-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Sendmail, attackers can gain root privileges via SMTP by specifying an improper \"mail from\" address and an invalid \"rcpt to\" address that would cause the mail to bounce to a program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.6.10:*:*:*:*:*:*:*","matchCriteriaId":"C39E29CD-70F7-4C96-93DD-18BD4C6DDFA4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1580","sourceIdentifier":"cve@mitre.org","published":"1995-08-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*","matchCriteriaId":"5DFC5B8B-9102-46A9-9BD3-5CC0B671383F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*","matchCriteriaId":"51BC02ED-17B1-44B3-97DB-F626A2BD2524"},{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*","matchCriteriaId":"EF58EBCB-5735-4569-957D-C37CC38F0823"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*","matchCriteriaId":"44F62CC9-2145-4801-9C3E-4D7232E6BD68"}]}]}],"references":[{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.auscert.org.au/render.html?it=1853&cid=1978","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/3278","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/7829","source":"cve@mitre.org"},{"url":"http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.auscert.org.au/render.html?it=1853&cid=1978","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/3278","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/7829","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0164","sourceIdentifier":"cve@mitre.org","published":"1995-08-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition in the Solaris ps command allows an attacker to overwrite critical files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*","matchCriteriaId":"D1DEB967-BD3E-4CCF-B53F-3927454FA689"}]}]}],"references":[{"url":"http://www.osvdb.org/8346","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8346","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0155","sourceIdentifier":"cve@mitre.org","published":"1995-08-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ghostscript command with the -dSAFER option allows remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aladdin_enterprises:ghostscript:2.6:*:*:*:*:*:*:*","matchCriteriaId":"1776085C-BF6C-4492-884C-09DEC1F46548"},{"vulnerable":true,"criteria":"cpe:2.3:a:aladdin_enterprises:ghostscript:3.22:*:*:*:*:*:*:*","matchCriteriaId":"2244ABF5-6D70-44A8-B9A2-FBFD5098B8FE"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0155","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0155","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0245","sourceIdentifier":"cve@mitre.org","published":"1995-09-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some configurations of NIS+ in Linux allowed attackers to log in as the user \"+\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0245","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0245","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0218","sourceIdentifier":"cve@mitre.org","published":"1995-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Livingston portmaster machines could be rebooted via a series of commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:livingston_portmaster:portmaster:*:*:*:*:*:*:*:*","matchCriteriaId":"77653D5B-96E7-4CEB-8E53-E20252C57246"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0218","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0218","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0073","sourceIdentifier":"cve@mitre.org","published":"1995-10-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:1.2:*:*:*:*:*:*:*","matchCriteriaId":"C3A2DB71-12B8-4CB2-A4EA-7C82B586C23C"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:1.3:*:*:*:*:*:*:*","matchCriteriaId":"B804A762-00CC-4F03-9E6D-31BB36E4159A"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C78E0958-E499-4A8B-A897-885274A939A2"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:3.0:*:*:*:*:*:*:*","matchCriteriaId":"DCCBDA4E-85CE-4EE8-BE0B-11FA585AAF38"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:3.2:*:*:*:*:*:*:*","matchCriteriaId":"44C7E5F5-363A-4C3C-8A48-8EC55B32778F"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:3.2g:*:*:*:*:*:*:*","matchCriteriaId":"BD4B2280-5114-4CBD-9B06-221BD9CE4229"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E1E08495-C0C5-40A9-A8FF-834F5F6083B3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0073","source":"cve@mitre.org"},{"url":"http://www.openwall.com/lists/oss-security/2026/02/24/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2026/03/07/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openwall.com/lists/oss-security/2026/03/08/6","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0073","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0099","sourceIdentifier":"cve@mitre.org","published":"1995-10-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in syslog utility allows local or remote attackers to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DD254562-D74A-4D7C-B846-E242D785B830"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"BBFBCFEE-C24C-4D38-83F9-810E05D27901"},{"vulnerable":true,"criteria":"cpe:2.3:o:convex:convexos:10.1:*:*:*:*:*:*:*","matchCriteriaId":"23D54B03-A4A6-4EAA-99FF-0E9C95B9E577"},{"vulnerable":true,"criteria":"cpe:2.3:o:convex:convexos:10.2:*:*:*:*:*:*:*","matchCriteriaId":"8F66F8E1-5C8C-4083-A249-C0CDC3EF5E65"},{"vulnerable":true,"criteria":"cpe:2.3:o:convex:convexos:11.0:*:*:*:*:*:*:*","matchCriteriaId":"8951D00C-8F5F-4A3B-ACFA-11E3CF81E263"},{"vulnerable":true,"criteria":"cpe:2.3:o:convex:convexos:11.1:*:*:*:*:*:*:*","matchCriteriaId":"91E2EDDA-29A5-4667-9F0E-8E2D2B814426"},{"vulnerable":true,"criteria":"cpe:2.3:o:convex:spp-ux:3:*:*:*:*:*:*:*","matchCriteriaId":"14DE04D9-AC79-4278-93A1-84BA6BDB4486"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:8.0:*:*:*:*:*:*:*","matchCriteriaId":"2E9226A7-8253-4AA4-8BD1-31219080261B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:8.3:*:*:*:*:*:*:*","matchCriteriaId":"3E7D776A-9DC2-4479-8064-BB86E005B2DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:9.0:*:*:*:*:*:*:*","matchCriteriaId":"FFB0C892-B2B2-4810-A009-AE1809730FE6"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0099","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0099","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0241","sourceIdentifier":"cve@mitre.org","published":"1995-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Guessable magic cookies in X Windows allows remote attackers to execute commands, e.g. through xterm."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:x11r6:*:*:*:*:*:*:*:*","matchCriteriaId":"BD822532-8A72-44E2-9C55-6E91E14E5A29"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0241","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0241","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0080","sourceIdentifier":"cve@mitre.org","published":"1995-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain configurations of wu-ftp FTP server 2.4 use a _PATH_EXECPATH setting to a directory with dangerous commands, such as /bin, which allows remote authenticated users to gain root access via the \"site exec\" command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"A86BB4F6-210F-448A-A3CB-127BEB5BD0D2"}]}]}],"references":[{"url":"https://archive.nanog.org/mailinglist/mailarchives/old_archive/1995-11/msg00385.html","source":"cve@mitre.org"},{"url":"https://archive.nanog.org/mailinglist/mailarchives/old_archive/1995-11/msg00385.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0123","sourceIdentifier":"cve@mitre.org","published":"1995-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Race condition in Linux mailx command allows local users to read user files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:P","baseScore":3.7,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"FFC0D816-7D38-4CE1-B78C-3A02195713D5"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0123","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0123","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0316","sourceIdentifier":"cve@mitre.org","published":"1995-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Linux splitvt command gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sam_lantinga:splitvt:*:*:*:*:*:*:*:*","versionEndIncluding":"1.6.3","matchCriteriaId":"2E29634F-66FE-421C-B20B-26DDDB929B58"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0316","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0316","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0325","sourceIdentifier":"cve@mitre.org","published":"1995-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"vhe_u_mnt program in HP-UX allows local users to create root files through symlinks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*","matchCriteriaId":"19587780-3515-484C-BCB4-F2BB90106C5C"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9406-013","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9406-013","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0208","sourceIdentifier":"cve@mitre.org","published":"1995-12-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.ypupdated (NIS) allows remote users to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3:*:*:*:*:*:*:*","matchCriteriaId":"FE9504A8-CCF7-4A7E-B85F-F5801E9BCA0E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4:*:*:*:*:*:*:*","matchCriteriaId":"C6AACDE0-00BA-4A29-8305-5AA0A4BC273C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:*:*:*:*:*:*:*:*","matchCriteriaId":"81B329CB-C41D-4487-A492-C34DC68899B6"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:*:*:*:*:*:*:*:*","matchCriteriaId":"AADD2657-6791-45DD-95C4-F437FCEF4357"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:up-ux_v:*:*:*:*:*:*:*:*","matchCriteriaId":"B10E6A9A-8C15-4349-AD4F-A24F65991034"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0208","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0208","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1186","sourceIdentifier":"cve@mitre.org","published":"1996-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rxvt, when compiled with the PRINT_PIPE option in various Linux operating systems including Linux Slackware 3.0 and RedHat 2.1, allows local users to gain root privileges by specifying a malicious program using the -print-pipe command line parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rxvt:rxvt:*:*:*:*:*:*:*:*","matchCriteriaId":"A9305637-EC79-4BD5-82FC-A1DF3A3D32F3"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"674066BB-2576-4AAE-B97F-A4470815F1AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"FFC0D816-7D38-4CE1-B78C-3A02195713D5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167418966&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167418966&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1319","sourceIdentifier":"cve@mitre.org","published":"1996-01-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.1","matchCriteriaId":"766C1270-2F54-47CF-A13A-8AB68D3C76ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19960101-01-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7430.php","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19960101-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7430.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1491","sourceIdentifier":"cve@mitre.org","published":"1996-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"674066BB-2576-4AAE-B97F-A4470815F1AC"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167418994&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/354","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167418994&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/354","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0103","sourceIdentifier":"cve@mitre.org","published":"1996-02-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-233-01","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/80171","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://ics-cert.us-cert.gov/advisories/ICSMA-18-233-01","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0143","sourceIdentifier":"cve@mitre.org","published":"1996-02-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Kerberos 4 key servers allow a user to masquerade as another by breaking and generating session keys."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"AFB8BD89-F049-4C3B-8744-E8D00D752DE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*","matchCriteriaId":"589D7E39-A243-49F9-8F67-4B9E92AE87DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:process_software:multinet:3.4:*:*:*:*:*:*:*","matchCriteriaId":"6DBE0C33-2F14-474B-B6E9-4415BDFDE179"},{"vulnerable":true,"criteria":"cpe:2.3:a:process_software:multinet:3.5:*:*:*:*:*:*:*","matchCriteriaId":"9F83D69E-4B23-4049-A521-BBDD27DB39EC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0143","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0143","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0233","sourceIdentifier":"cve@mitre.org","published":"1996-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 1.0 allows users to execute arbitrary commands using .bat or .cmd files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:1.0:*:*:*:*:*:*:*","matchCriteriaId":"6DB3FA68-3ACE-4051-9FD5-34F9A30EB226"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ148188","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ155056","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ148188","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ155056","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0142","sourceIdentifier":"cve@mitre.org","published":"1996-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:*:*:*:*:*:*:*:*","matchCriteriaId":"DA2CA2F8-260C-4559-BF24-3E321CEAE93F"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*","matchCriteriaId":"5DDA9F90-5D16-4E04-B285-D32C362279C6"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0142","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0142","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0067","sourceIdentifier":"cve@mitre.org","published":"1996-03-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"phf CGI program allows remote command execution through shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"B5EA86B9-4F86-4ADA-BC6A-4F6E261848F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_httpd:1.5a:*:export:*:*:*:*:*","matchCriteriaId":"7D7735EC-8C34-4C2B-B8CC-154182D070C2"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1996-06.html","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/136","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/629","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.cert.org/advisories/CA-1996-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/136","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/629","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0141","sourceIdentifier":"cve@mitre.org","published":"1996-03-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Java Bytecode Verifier allows malicious applets to execute arbitrary commands as the user of the applet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:P","baseScore":3.7,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:2.02:*:*:*:*:*:*:*","matchCriteriaId":"DA1BDF4E-F2B7-48A6-A276-2C69BEAD932A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/134","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/134","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0070","sourceIdentifier":"cve@mitre.org","published":"1996-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"test-cgi program allows an attacker to list files on the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*","versionEndExcluding":"1.3.0","matchCriteriaId":"FE76D3D5-34AB-4914-81E5-5AC947241D01"}]}]}],"references":[{"url":"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rc5d27fc1e76dc5650e1a3f1db1de403120f4c2d041cb7352850455c2%40%3Cusers.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1103","sourceIdentifier":"cve@mitre.org","published":"1996-04-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dxconsole in DEC OSF/1 3.2C and earlier allows local users to read arbitrary files by specifying the file with the -file parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2c","matchCriteriaId":"FC787AC7-B485-4ACD-B739-D8C3A68C1557"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/g-18.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/vendor_bulletins/VB-96.05.dec","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7138.php","source":"cve@mitre.org"},{"url":"http://www.tao.ca/fire/bos/0209.html","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/g-18.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/vendor_bulletins/VB-96.05.dec","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.iss.net/security_center/static/7138.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.tao.ca/fire/bos/0209.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0078","sourceIdentifier":"cve@mitre.org","published":"1996-04-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"pcnfsd (aka rpc.pcnfsd) allows local users to change file permissions, or execute arbitrary commands through arguments in the RPC call."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:N/A:N","baseScore":1.9,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.4,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncr:mp-ras:2.03:*:*:*:*:*:*:*","matchCriteriaId":"E7039C60-B488-4A64-9532-EA1C9E175C8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncr:mp-ras:3.0:*:*:*:*:*:*:*","matchCriteriaId":"28ADAFCA-AD99-40C7-B4C0-1BA5D3DB98F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncr:mp-ras:3.01:*:*:*:*:*:*:*","matchCriteriaId":"D35762F1-5C22-4A55-9EDC-0F67E6B747EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7932DF-A035-4506-9BF1-C733DC5DD872"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:up-ux_v:*:*:*:*:*:*:*:*","matchCriteriaId":"B10E6A9A-8C15-4349-AD4F-A24F65991034"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:*:*:*:*:*:*:*:*","matchCriteriaId":"2A06752D-81F8-4150-87B8-117095838222"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5:*:*:*:*:*:*:*","matchCriteriaId":"4EDA6C83-76C9-44F1-94A2-1CBCC7DBBB00"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0078","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0078","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0019","sourceIdentifier":"cve@mitre.org","published":"1996-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Delete or create a file via rpc.statd, due to invalid information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:4.11:*:*:*:*:*:*:*","matchCriteriaId":"F008DEB7-9A49-43BB-8F37-809B5D398676"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncr:mp-ras:2.03:*:*:*:*:*:*:*","matchCriteriaId":"E7039C60-B488-4A64-9532-EA1C9E175C8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncr:mp-ras:3.0:*:*:*:*:*:*:*","matchCriteriaId":"28ADAFCA-AD99-40C7-B4C0-1BA5D3DB98F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:nighthawk:cx_ux:*:*:*:*:*:*:*:*","matchCriteriaId":"8D964BE6-892C-4C22-A894-8143776DF8F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:nighthawk:powerux:*:*:*:*:*:*:*:*","matchCriteriaId":"F1E05E77-3B17-4177-A10E-CAE4809F81AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2:*:*:*:*:*:*:*","matchCriteriaId":"5724993B-7563-48C2-8BD1-25E4E57C6699"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3:*:*:*:*:*:*:*","matchCriteriaId":"66086A58-91FC-4203-B2C2-4B3091A1C548"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7363FF35-7C67-40DC-AD38-74FD6264BF5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2:*:*:*:*:*:*:*","matchCriteriaId":"B8352832-11AE-4BE4-B996-AA90E755066B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*","matchCriteriaId":"D1DEB967-BD3E-4CCF-B53F-3927454FA689"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*","matchCriteriaId":"1C89DF53-2038-487A-A08F-8D705B7BFB27"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/135","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/135","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1314","sourceIdentifier":"cve@mitre.org","published":"1996-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in union file system in FreeBSD 2.2 and earlier, and possibly other operating systems, allows local users to cause a denial of service (system reload) via a series of certain mount_union commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2","matchCriteriaId":"0963E658-392C-4B64-8358-1CCF8444852C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1:stable:*:*:*:*:*:*","matchCriteriaId":"F25E27BA-F884-456B-9600-A4A0B8877A6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:current:*:*:*:*:*:*","matchCriteriaId":"FE799983-DF99-428E-B560-321680C85A75"}]}]}],"references":[{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:10.mount_union.asc","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7429.php","source":"cve@mitre.org"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:10.mount_union.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7429.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1313","sourceIdentifier":"cve@mitre.org","published":"1996-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Manual page reader (man) in FreeBSD 2.2 and earlier allows local users to gain privileges via a sequence of commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2","matchCriteriaId":"0963E658-392C-4B64-8358-1CCF8444852C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"}]}]}],"references":[{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7348","source":"cve@mitre.org"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:11.man.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/g-24.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7348","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0522","sourceIdentifier":"cve@mitre.org","published":"1996-05-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The permissions for a system-critical NIS+ table (e.g. passwd) are inappropriate."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0522","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0522","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0509","sourceIdentifier":"cve@mitre.org","published":"1996-05-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Perl, sh, csh, or other shell interpreters are installed in the cgi-bin directory on a WWW site, which allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/146","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/146","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1205","sourceIdentifier":"cve@mitre.org","published":"1996-06-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"nettune in HP-UX 10.01 and 10.00 is installed setuid root, which allows local users to cause a denial of service by modifying critical networking configuration information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167419195&w=2","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/advisories/ibm-ers/96-08","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/414","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167419195&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://packetstormsecurity.org/advisories/ibm-ers/96-08","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/414","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1253","sourceIdentifier":"cve@mitre.org","published":"1996-06-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in a kernel error handling routine in SCO OpenServer 5.0.2 and earlier, and SCO Internet FastStart 1.0, allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*","matchCriteriaId":"61FEF2E3-1939-42B3-B32F-A22C173A186A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0.2","matchCriteriaId":"F95AC07F-8326-4E55-8E62-CE5934F7512C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB.96:01a","source":"cve@mitre.org"},{"url":"http://www.cert.org/vendor_bulletins/VB-96.10.sco","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1965","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB.96:01a","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/vendor_bulletins/VB-96.10.sco","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1965","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0138","sourceIdentifier":"cve@mitre.org","published":"1996-06-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The suidperl and sperl program do not give up root privileges when changing UIDs back to the original users, allowing root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:a_ux:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E7A2CCF8-36A1-4E5E-A36F-5E90357A2B42"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:1.3:*:*:*:*:*:*:*","matchCriteriaId":"B804A762-00CC-4F03-9E6D-31BB36E4159A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*","matchCriteriaId":"19587780-3515-484C-BCB4-F2BB90106C5C"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4:*:*:*:*:*:*:*","matchCriteriaId":"0BAE3D61-9D78-46D7-87EB-5A33ECF86F83"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"CCE246DE-641C-44A3-9FCC-5131655DBC1A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*","matchCriteriaId":"96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:*:*:*:*:*:*:*:*","matchCriteriaId":"81B329CB-C41D-4487-A492-C34DC68899B6"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*","matchCriteriaId":"EFDDBA47-A0E3-4EB2-868A-A9B998B0154E"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*","matchCriteriaId":"6CF54267-A293-44B1-BD9A-14CD39F732C2"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*","matchCriteriaId":"875BE14D-96DC-4973-B077-40C7DFC75B02"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0138","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0138","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0175","sourceIdentifier":"cve@mitre.org","published":"1996-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:web_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"A5E61D92-5594-41F2-8F38-1F6A832C94CF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0175","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0175","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0022","sourceIdentifier":"cve@mitre.org","published":"1996-07-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local user gains root privileges via buffer overflow in rdist, via expstr() function."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*","matchCriteriaId":"2F5E922C-239D-4F98-87ED-BB7998BE99C5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"92BBA0D2-E284-4AA6-A3B9-8FA37302D53B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/179","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0137","sourceIdentifier":"cve@mitre.org","published":"1996-07-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The dip program on many Linux systems allows local users to gain root access via a buffer overflow."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fred_n._van_kempen:dip:3.3.7o:*:*:*:*:*:*:*","matchCriteriaId":"8853C5DE-ED16-4B51-AFD2-9A7208A7A805"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0137","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0137","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1301","sourceIdentifier":"cve@mitre.org","published":"1996-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A design flaw in the Z-Modem protocol allows the remote sender of a file to execute arbitrary programs on the client, as implemented in rz in the rzsz module of FreeBSD before 2.1.5, and possibly other programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1.5","matchCriteriaId":"CE5639A0-BF14-47C9-9271-E081FCFCE40A"}]}]}],"references":[{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:17.rzsz.asc","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/g-31.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7540.php","source":"cve@mitre.org"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:17.rzsz.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/g-31.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7540.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1572","sourceIdentifier":"cve@mitre.org","published":"1996-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"cpio on FreeBSD 2.1.0, Debian GNU/Linux 3.0, and possibly other operating systems, uses a 0 umask when creating files using the -O (archive) or -F options, which creates the files with mode 0666 and allows local users to read or overwrite those files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"2CAE037F-111C-4A76-8FFE-716B74D65EF3"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*","matchCriteriaId":"4177C378-7729-46AB-B49B-C6DAED3200E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*","matchCriteriaId":"A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*","matchCriteriaId":"3528DABD-B821-4D23-AE12-614A9CA92C46"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:cs2.1:*:*:*:*:*:*:*","matchCriteriaId":"B5B3DB31-3998-4B75-A972-0F2675ACCA2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:cs3.0:*:*:*:*:*:*:*","matchCriteriaId":"37145402-6EC5-4700-8863-CE563A4F37F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:advanced_server:*:*:*:*:*","matchCriteriaId":"F9440B25-D206-4914-9557-B5F030890DEC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:enterprise_server:*:*:*:*:*","matchCriteriaId":"E9933557-3BCA-4D92-AD4F-27758A0D3347"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux:4.0:*:workstation:*:*:*:*:*","matchCriteriaId":"10A60552-15A5-4E95-B3CE-99A4B26260C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:enterprise_linux_desktop:4.0:*:*:*:*:*:*:*","matchCriteriaId":"7D74A418-50F0-42C0-ABBC-BBBE718FF025"},{"vulnerable":true,"criteria":"cpe:2.3:o:ubuntu:ubuntu_linux:4.10:*:*:*:*:*:*:*","matchCriteriaId":"C62EF915-CA7C-4D75-BC67-E015772BB9CF"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=110763404701519&w=2","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/14357","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/17063","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/17532","source":"cve@mitre.org"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2005/dsa-664","source":"cve@mitre.org"},{"url":"http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:032","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-073.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-080.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-806.html","source":"cve@mitre.org"},{"url":"http://www.trustix.org/errata/2005/0003/","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19167","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=110763404701519&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/14357","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/17063","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/17532","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-212.pdf","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2005/dsa-664","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/1391","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.mandriva.com/security/advisories?name=MDKSA-2005:032","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-073.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-080.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-806.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.trustix.org/errata/2005/0003/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/19167","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10888","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"Fixed in rev 1.3 of cpio/main.c.","vendorComments":[{"organization":"Red Hat","comment":"Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.","lastModified":"2007-03-14T00:00:00"}]}},{"cve":{"id":"CVE-1999-0023","sourceIdentifier":"cve@mitre.org","published":"1996-07-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local user gains root privileges via buffer overflow in rdist, via lookup() function."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:inet:inet:5.01:*:*:*:*:*:*:*","matchCriteriaId":"A680AE78-F1C0-4EA2-9D71-55F3EADA59C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:inet:inet:6.01:*:*:*:*:*:*:*","matchCriteriaId":"1919C12E-1448-4922-BDB1-E123CD23C446"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7932DF-A035-4506-9BF1-C733DC5DD872"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*","matchCriteriaId":"61FEF2E3-1939-42B3-B32F-A22C173A186A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A765EC-A399-494A-A644-338FB2F014ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:2.0:*:*:*:*:*:*:*","matchCriteriaId":"5FAA3048-117B-4E69-8DFE-E96A343FB29A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:tcp_ip:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"DB18BA3A-B2BB-4816-9223-5BFAAEBCC00E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:tcp_ip:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"5783678F-80FA-4E1A-A637-7774CE3910EF"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.0:*:*:*:*:*:*:*","matchCriteriaId":"43D2F319-DF69-4E52-AF29-06DF1E312030"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0023","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0135","sourceIdentifier":"cve@mitre.org","published":"1996-07-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"admintool in Solaris allows a local user to write to arbitrary files and gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0135","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0135","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0136","sourceIdentifier":"cve@mitre.org","published":"1996-07-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*","matchCriteriaId":"1C89DF53-2038-487A-A08F-8D705B7BFB27"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0136","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0136","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0335","sourceIdentifier":"cve@mitre.org","published":"1996-08-01T04:00:00.000","lastModified":"2023-11-07T01:54:57.050","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-1999-0032. Reason: This candidate is a duplicate of CVE-1999-0032. Notes: All CVE users should reference CVE-1999-0032 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-1413","sourceIdentifier":"cve@mitre.org","published":"1996-08-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris 2.4 before kernel jumbo patch -35 allows set-gid programs to dump core even if the real user id is not in the set-gid group, which allows local users to overwrite or create files at higher privileges by causing a core dump, e.g. through dmesg."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167419549&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/296","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167419549&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/296","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0134","sourceIdentifier":"cve@mitre.org","published":"1996-08-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"vold in Solaris 2.x allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*","matchCriteriaId":"D1DEB967-BD3E-4CCF-B53F-3927454FA689"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*","matchCriteriaId":"1C89DF53-2038-487A-A08F-8D705B7BFB27"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B"}]}]}],"references":[{"url":"http://www.osvdb.org/8159","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8159","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0133","sourceIdentifier":"cve@mitre.org","published":"1996-08-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"fm_fls license server for Adobe Framemaker allows local users to overwrite arbitrary files and gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:framemaker:*:*:*:*:*:*:*:*","matchCriteriaId":"7695D75F-240E-496E-B90A-37C06804D433"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0133","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0133","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0132","sourceIdentifier":"cve@mitre.org","published":"1996-08-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Expreserve, as used in vi and ex, allows local users to overwrite arbitrary files and gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1996-19.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/11723","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/401","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1996-19.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/11723","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/401","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0085","sourceIdentifier":"cve@mitre.org","published":"1996-08-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in rwhod on AIX and other operating systems allows remote attackers to execute arbitrary code via a UDP packet with a long hostname."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/118","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/119","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/118","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/119","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1187","sourceIdentifier":"cve@mitre.org","published":"1996-08-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pine before version 3.94 allows local users to gain privileges via a symlink attack on a lockfile that is created when a user receives new mail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:*:*:*:*:*:*:*:*","versionEndIncluding":"3.94","matchCriteriaId":"1685EF8F-74A5-40EF-9A7E-200D32AA5C84"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"FFC0D816-7D38-4CE1-B78C-3A02195713D5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167419803&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/416","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167419803&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/416","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1309","sourceIdentifier":"cve@mitre.org","published":"1996-08-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*","versionEndIncluding":"8.6.7","matchCriteriaId":"21B4A707-2F44-447E-A134-05EE7C848EE0"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-94.12.sendmail.vulnerabilities","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0040.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0042.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0043.html","source":"cve@mitre.org"},{"url":"http://www.dataguard.no/bugtraq/1994_1/0048.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0078.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7155","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-94.12.sendmail.vulnerabilities","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0040.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0042.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0043.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.dataguard.no/bugtraq/1994_1/0048.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_1/0078.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7155","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0324","sourceIdentifier":"cve@mitre.org","published":"1996-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ppl program in HP-UX allows local users to create root files through symlinks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9702-053","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9702-053","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1252","sourceIdentifier":"cve@mitre.org","published":"1996-09-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in a certain system call in SCO UnixWare 2.0.x and 2.1.0 allows local users to access arbitrary files and gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.0.x:*:*:*:*:*:*:*","matchCriteriaId":"597CABF3-021F-44F8-BE78-FABFE7337D1B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"C0F61CC4-74D7-4E8D-A409-90A89ACC4981"}]}]}],"references":[{"url":"ftp://ftp.sco.COM/SSE/security_bulletins/SB.96:02a","source":"cve@mitre.org"},{"url":"http://www.cert.org/vendor_bulletins/VB-96.15.sco","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1966","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.COM/SSE/security_bulletins/SB.96:02a","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/vendor_bulletins/VB-96.15.sco","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1966","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0131","sourceIdentifier":"cve@mitre.org","published":"1996-09-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.6:*:*:*:*:*:*:*","matchCriteriaId":"9413566A-425B-4684-A332-A9DD3309FB51"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.1:*:*:*:*:*:*:*","matchCriteriaId":"C2D488B8-49D0-4AFD-A5C1-63CB036E3886"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.2:*:*:*:*:*:*:*","matchCriteriaId":"A3E2EE58-BCAD-4F26-94B6-F91CF1731429"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.3:*:*:*:*:*:*:*","matchCriteriaId":"10AC2FAD-C4AD-46DD-88D1-4F99433B3476"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.4:*:*:*:*:*:*:*","matchCriteriaId":"3B730F70-5662-4BE4-8202-93E12620CBD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.5:*:*:*:*:*:*:*","matchCriteriaId":"FA6D5E9F-275F-41EB-9707-6B7F129A700F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"44C3AF89-3854-4F37-807E-74FC0640693B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"445EECD3-2DB9-43D1-B26F-0979A3C02D45"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*","matchCriteriaId":"61FEF2E3-1939-42B3-B32F-A22C173A186A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/717","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/717","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1383","sourceIdentifier":"cve@mitre.org","published":"1996-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"(1) bash before 1.14.7, and (2) tcsh 6.05 allow local users to gain privileges via directory names that contain shell metacharacters (` back-tick), which can cause the commands enclosed in the directory name to be executed when the shell expands filenames using the \\w option in the PS1 variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*","versionEndIncluding":"1.14.6","matchCriteriaId":"357D1D06-CC5B-47BA-98FE-2A6FA2160A42"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*","matchCriteriaId":"FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*","matchCriteriaId":"FCF4B4BB-C5A0-4283-9657-FC61BC95C014"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*","matchCriteriaId":"9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*","matchCriteriaId":"972BDA0A-25C8-4C02-8624-07D2462C214C"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*","matchCriteriaId":"5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*","matchCriteriaId":"DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20"},{"vulnerable":true,"criteria":"cpe:2.3:a:tcsh:tcsh:6.05:*:*:*:*:*:*:*","matchCriteriaId":"FDCD3DC8-DE2D-4B39-BC5B-17768A3F6539"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167419868&w=2","source":"cve@mitre.org"},{"url":"http://www.dataguard.no/bugtraq/1996_3/0503.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167419868&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.dataguard.no/bugtraq/1996_3/0503.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1295","sourceIdentifier":"cve@mitre.org","published":"1996-09-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Transarc DCE Distributed File System (DFS) 1.1 for Solaris 2.4 and 2.5 does not properly initialize the grouplist for users who belong to a large number of groups, which could allow those users to gain access to resources that are protected by DFS."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:transarc:dce_distributed_file_system:1.1:*:*:*:*:*:*:*","matchCriteriaId":"F8C6B357-06FF-4FEA-871B-4426AECA6A1C"}]}]}],"references":[{"url":"http://www.cert.org/vendor_bulletins/VB-96.16.transarc","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7154","source":"cve@mitre.org"},{"url":"http://www.cert.org/vendor_bulletins/VB-96.16.transarc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7154","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0116","sourceIdentifier":"cve@mitre.org","published":"1996-09-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service when an attacker sends many SYN packets to create multiple connections without ever sending an ACK to complete the connection, aka SYN flood."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*","matchCriteriaId":"6FAC4577-5CC1-4099-8CBE-8AD5C1AF3807"},{"vulnerable":true,"criteria":"cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*","matchCriteriaId":"E223FC83-3079-4EB8-940F-5546DCD6F473"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961202-01-PX","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/136","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961202-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/136","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0961","sourceIdentifier":"cve@mitre.org","published":"1996-09-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HPUX sysdiag allows local users to gain root privileges via a symlink attack during log file creation."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*","matchCriteriaId":"E178238D-E17A-48C9-8922-AC92474BDF55"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167419906&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167419906&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0206","sourceIdentifier":"cve@mitre.org","published":"1996-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MIME buffer overflow in Sendmail 8.8.0 and 8.8.1 gives root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8:*:*:*:*:*:*:*","matchCriteriaId":"C973CF06-BEE8-4D79-8649-1510E9EFC29D"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.1:*:*:*:*:*:*:*","matchCriteriaId":"56D2BAF2-F430-41A1-8DEE-1D9CB2A56C32"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0206","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0206","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0246","sourceIdentifier":"cve@mitre.org","published":"1996-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP Remote Watch allows a remote user to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0246","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0246","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0308","sourceIdentifier":"cve@mitre.org","published":"1996-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP-UX gwind program allows users to modify arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8:*:*:*:*:*:*:*","matchCriteriaId":"19587780-3515-484C-BCB4-F2BB90106C5C"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9410-018","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9410-018","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0319","sourceIdentifier":"cve@mitre.org","published":"1996-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in xmcd 2.1 allows local users to gain access through a user resource setting."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0319","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0319","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0234","sourceIdentifier":"cve@mitre.org","published":"1996-10-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Bash treats any character with a value of 255 as a command separator."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:yggdrasil:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"7467132F-CA92-462F-8E2C-E0EEBD956E7B"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*","matchCriteriaId":"4EC3F7E5-5D49-471B-A705-ADD2642E5B46"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"445EECD3-2DB9-43D1-B26F-0979A3C02D45"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"451453AC-65FF-4E3B-9AC1-2DDB2E2182E4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0234","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0234","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0075","sourceIdentifier":"cve@mitre.org","published":"1996-10-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PASV core dump in wu-ftpd daemon when attacker uses a QUOTE PASV command after specifying a username and password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:*:*:*:*:*:*:*:*","matchCriteriaId":"E0326E91-1E2D-4F29-BFEA-11BE48640AE8"}]}]}],"references":[{"url":"http://www.osvdb.org/5742","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/5742","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0032","sourceIdentifier":"cve@mitre.org","published":"1996-10-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in lpr, as used in BSD-based systems including Linux, allows local users to execute arbitrary code as root via a long -C (classification) command line option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:4.0:*:*:*:*:*:*:*","matchCriteriaId":"1FEE8CF7-908D-4E24-A2BA-B58BF4031C9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:4.1:*:*:*:*:*:*:*","matchCriteriaId":"C1EBBE68-C1F9-4982-A3CE-F10E22A9EEC0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/i-042.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/707","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980402-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/i-042.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/707","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0277","sourceIdentifier":"cve@mitre.org","published":"1996-10-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WorkMan program can be used to overwrite any file to get root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0277","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0277","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1384","sourceIdentifier":"cve@mitre.org","published":"1996-10-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Indigo Magic System Tour in the SGI system tour package (systour) for IRIX 5.x through 6.3 allows local users to gain root privileges via a Trojan horse .exitops program, which is called by the inst command that is executed by the RemoveSystemTour program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.3","matchCriteriaId":"AD4F5EAB-8D13-4363-8E66-0BAB031B4233"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.08.SGI.systour.vul","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961101-01-I","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420095&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7456.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/470","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.08.SGI.systour.vul","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961101-01-I","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420095&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7456.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/470","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0311","sourceIdentifier":"cve@mitre.org","published":"1996-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"fpkg2swpk in HP-UX allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9612-042","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9612-042","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0336","sourceIdentifier":"cve@mitre.org","published":"1996-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in mstm in HP-UX allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0336","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0336","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1161","sourceIdentifier":"cve@mitre.org","published":"1996-11-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in ppl in HP-UX 10.x and earlier allows local users to gain root privileges by forcing ppl to core dump."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"10","matchCriteriaId":"992B5A83-60E4-490B-803D-C9C2E12C7BBD"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-32.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420102&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420103&w=2","source":"cve@mitre.org"},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9704-057.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.iss.net/security_center/static/7438.php","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-32.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420102&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602167420103&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9704-057.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.iss.net/security_center/static/7438.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0130","sourceIdentifier":"cve@mitre.org","published":"1996-11-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local users can start Sendmail in daemon mode and gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:caldera:network_desktop:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C6CA6D9E-90A8-4A56-A6E9-24618F3FC4F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7:*:*:*:*:*:*:*","matchCriteriaId":"31E3751E-859F-47E5-8048-FCBA450DD4B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8:*:*:*:*:*:*:*","matchCriteriaId":"C973CF06-BEE8-4D79-8649-1510E9EFC29D"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.1:*:*:*:*:*:*:*","matchCriteriaId":"56D2BAF2-F430-41A1-8DEE-1D9CB2A56C32"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.2:*:*:*:*:*:*:*","matchCriteriaId":"5E36E877-6028-49DE-8B2E-3087A141F8EC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/716","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/716","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1221","sourceIdentifier":"cve@mitre.org","published":"1996-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dxchpwd in Digital Unix (OSF/1) 3.x allows local users to modify arbitrary files via a symlink attack on the dxchpwd.log file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:3:*:*:*:*:*:*:*","matchCriteriaId":"6936C57F-0574-41C7-B3EA-323FADA11552"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420141&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/399","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420141&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/399","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1099","sourceIdentifier":"cve@mitre.org","published":"1996-11-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Kerberos 4 allows remote attackers to obtain sensitive information via a malformed UDP packet that generates an error string that inadvertently includes the realm name and the last user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kth:kth_kerberos:4:*:*:*:*:*:*:*","matchCriteriaId":"A04BDD12-4421-49FA-9322-25F00B0402F3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420184&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420184&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/65","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1240","sourceIdentifier":"cve@mitre.org","published":"1996-11-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in cddbd CD database server allows remote attackers to execute arbitrary commands via a long log message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gracenote:cddbd:*:*:*:*:*:*:*:*","matchCriteriaId":"2F6E50C6-7439-495B-B8A1-3613E5595997"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/5784","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2203","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/5784","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2203","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0050","sourceIdentifier":"cve@mitre.org","published":"1996-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in HP-UX newgrp program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*","matchCriteriaId":"E7FA635E-C0FE-495C-A2BB-D9C30A95FD00"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*","matchCriteriaId":"E178238D-E17A-48C9-8922-AC92474BDF55"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*","matchCriteriaId":"3194CFA3-F0B3-487A-99C6-1A7DF1EF0586"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*","matchCriteriaId":"035890F7-BF48-4669-812A-1DCBD91A8F34"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*","matchCriteriaId":"F9AED8F3-2501-444D-8141-37FEE2246747"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*","matchCriteriaId":"10974B0F-DA3A-4E3E-8914-8CEB366E9CC4"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*","matchCriteriaId":"C54F7F74-7DD7-431E-AE75-1D1199D63032"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0050","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0050","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0044","sourceIdentifier":"cve@mitre.org","published":"1996-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"fsdump command in IRIX allows local users to obtain root access by modifying sensitive files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970301-01-P","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970301-01-P","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0129","sourceIdentifier":"cve@mitre.org","published":"1996-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8:*:*:*:*:*:*:*","matchCriteriaId":"C973CF06-BEE8-4D79-8649-1510E9EFC29D"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.1:*:*:*:*:*:*:*","matchCriteriaId":"56D2BAF2-F430-41A1-8DEE-1D9CB2A56C32"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.2:*:*:*:*:*:*:*","matchCriteriaId":"5E36E877-6028-49DE-8B2E-3087A141F8EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.3:*:*:*:*:*:*:*","matchCriteriaId":"9D8484F8-8712-4B55-A163-BA492B4D0095"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"7891202C-62AF-4590-9E5F-3514FDA2B38E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*","matchCriteriaId":"61FEF2E3-1939-42B3-B32F-A22C173A186A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A95C1672-F798-44D2-94A1-19492C395FF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1996-25.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1996-25.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0043","sourceIdentifier":"cve@mitre.org","published":"1996-12-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Command execution via shell metachars in INN daemon (innd) 1.5 using \"newgroup\" and \"rmgroup\" control messages, and others."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-78"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4sec:*:*:*:*:*:*:*","matchCriteriaId":"E5D0063D-01CE-49E2-A19A-FA861F3C40CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4sec2:*:*:*:*:*:*:*","matchCriteriaId":"967E86C5-3635-49FF-A98A-C9B2BC85A812"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4unoff3:*:*:*:*:*:*:*","matchCriteriaId":"14DBB010-4064-4B46-834C-6FD5F1FE78FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4unoff4:*:*:*:*:*:*:*","matchCriteriaId":"EEE0D317-4F02-4896-95FC-20B64EB3A91F"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.5:*:*:*:*:*:*:*","matchCriteriaId":"9915A668-8E8C-4EC8-A72A-6937EC7D3496"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:news_server:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A0FB9EFB-F5C3-447B-A1B7-DB762F93D8F2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_intrasv:1.1:*:*:*:*:*:*:*","matchCriteriaId":"39F6E390-A2CF-4F42-83EC-65B23EC644CA"},{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_networksv:1.2:*:*:*:*:*:*:*","matchCriteriaId":"11389E13-8EE5-4C33-9A6D-4B30849F0722"},{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_networksv:2.2:*:*:*:*:*:*:*","matchCriteriaId":"3C409173-AC55-493F-9B55-51A69D933F04"},{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_networksv:3.1:*:*:*:*:*:*:*","matchCriteriaId":"2CC1F3C7-D016-44B4-843A-34538227668B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0043","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1401","sourceIdentifier":"cve@mitre.org","published":"1996-12-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Desktop searchbook program in IRIX 5.0.x through 6.2 sets insecure permissions for certain user files (iconbook and searchbook)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961201-01-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7575.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8563","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/463","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961201-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7575.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8563","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/463","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0045","sourceIdentifier":"cve@mitre.org","published":"1996-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"List of arbitrary files on Web host via nph-test-cgi script."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*","matchCriteriaId":"E80E240C-9879-48EC-AC9A-2C1FD5E2DD8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*","matchCriteriaId":"AF16AF7D-9475-435F-AE36-F16CE8F45A75"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"06F3141B-2C30-4230-A425-465E235539EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"B6D2C9EA-1241-4DE6-A6CD-FCD7EEC9B42D"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"B5EA86B9-4F86-4ADA-BC6A-4F6E261848F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"CA6523AC-ECC9-4A79-9387-18308FCF9A68"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*","matchCriteriaId":"BDCBCF0F-63FB-4A03-92F8-FF121083CD85"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:commerce_server:1.12:*:*:*:*:*:*:*","matchCriteriaId":"0A67EC36-0EEB-4B5F-A504-95DD2A16BFC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communications_server:1.1:*:*:*:*:*:*:*","matchCriteriaId":"B5F14356-4229-49C3-BBA5-2B2149517630"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communications_server:1.12:*:*:*:*:*:*:*","matchCriteriaId":"BFBF7DF8-A638-4801-A41B-EBE5AAE51850"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:2.0a:*:*:*:*:*:*:*","matchCriteriaId":"5234109F-AD90-4324-AA03-C5DE007D32F7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0045","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0045","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0096","sourceIdentifier":"cve@mitre.org","published":"1996-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail decode alias can be used to overwrite sensitive files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7932DF-A035-4506-9BF1-C733DC5DD872"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"7891202C-62AF-4590-9E5F-3514FDA2B38E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*","matchCriteriaId":"61FEF2E3-1939-42B3-B32F-A22C173A186A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A95C1672-F798-44D2-94A1-19492C395FF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/122&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0101","sourceIdentifier":"cve@mitre.org","published":"1996-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX and Solaris \"gethostbyname\" library call allows root access through corrupt DNS host names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-13.shtml","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-13.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0297","sourceIdentifier":"cve@mitre.org","published":"1996-12-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Vixie Cron library up to version 3.0 allows local users to obtain root access via a long environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paul_vixie:vixie_cron:3.0:*:*:*:*:*:*:*","matchCriteriaId":"41EA671E-F3F2-464A-8FAB-6C9D8DB9E002"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"B133DAC8-2B0D-4F83-9025-AD071740187A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0297","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0297","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1089","sourceIdentifier":"cve@mitre.org","published":"1996-12-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in chfn command in HP-UX 9.X through 10.20 allows local users to gain privileges via a long command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"10.20","matchCriteriaId":"BBC898E5-04EC-4AF5-ACA3-7080D8AAA493"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-16.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420285&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2008","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-16.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420285&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2008","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0128","sourceIdentifier":"cve@mitre.org","published":"1996-12-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"38BB277F-9761-40E9-8869-392C0B948AF4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"DD1C3260-28D8-47C8-AB61-E2EA4ED2B1C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*","matchCriteriaId":"96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*","matchCriteriaId":"61FEF2E3-1939-42B3-B32F-A22C173A186A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A95C1672-F798-44D2-94A1-19492C395FF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:tcp_ip:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"5783678F-80FA-4E1A-A637-7774CE3910EF"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*","matchCriteriaId":"D1DEB967-BD3E-4CCF-B53F-3927454FA689"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*","matchCriteriaId":"1C89DF53-2038-487A-A08F-8D705B7BFB27"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ibm:sng:*:*:*:*:*:*:*:*","matchCriteriaId":"A852082C-D2F2-4F05-9A88-1FE5CA82912D"},{"vulnerable":true,"criteria":"cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*","matchCriteriaId":"6FAC4577-5CC1-4099-8CBE-8AD5C1AF3807"},{"vulnerable":true,"criteria":"cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*","matchCriteriaId":"E223FC83-3079-4EB8-940F-5546DCD6F473"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0128","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0127","sourceIdentifier":"cve@mitre.org","published":"1996-12-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0127","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0127","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1385","sourceIdentifier":"cve@mitre.org","published":"1996-12-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ppp program in FreeBSD 2.1 and earlier allows local users to gain privileges via a long HOME environment variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1.0","matchCriteriaId":"1B6DE106-4EE6-43F4-B580-0BA6941F4825"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"44EFD22E-02C9-4B80-8934-A9AC8DD858CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"B1B4D4A5-25EB-48FE-BDFD-A274CE802648"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"7891202C-62AF-4590-9E5F-3514FDA2B38E"}]}]}],"references":[{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:20.stack-overflow.asc","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420332&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7465.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6085","source":"cve@mitre.org"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-96:20.stack-overflow.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420332&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7465.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6085","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1026","sourceIdentifier":"cve@mitre.org","published":"1996-12-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"aspppd on Solaris 2.5 x86 allows local users to modify arbitrary files and gain root privileges via a symlink attack on the /tmp/.asppp.fifo file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420343&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/292","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420343&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/292","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0260","sourceIdentifier":"cve@mitre.org","published":"1996-12-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The jj CGI program allows command execution via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:renaud_deraison:jj:*:*:*:*:*:*:*:*","matchCriteriaId":"886EA3F0-F1DF-4C4C-BF57-0205FC0AF3B9"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0260","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0260","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1251","sourceIdentifier":"cve@mitre.org","published":"1996-12-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in direct audio user space code on HP-UX 10.20 and 10.10 allows local users to cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://packetstormsecurity.org/advisories/hpalert/043","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2010","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/advisories/hpalert/043","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2010","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0100","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote access in AIX innd 1.5.1, using control messages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"5658CF74-5AF1-4161-BF4C-6A394F2AA164"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0100","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0100","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0163","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In older versions of Sendmail, an attacker could use a pipe character to execute root commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:*:*:*:*:*:*:*:*","matchCriteriaId":"887964FC-405F-40DB-B848-806748BA6FE8"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0163","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0163","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0166","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NFS allows users to use a \"cd ..\" command to access other directories besides the exported file system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:nfs:*:*:*:*:*:*:*:*","matchCriteriaId":"A53226D2-00D1-4D69-AF1A-A9EBD5B7DE5F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0166","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0166","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0170","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*","matchCriteriaId":"EE8B41E9-5792-4ADA-A140-2E709321E147"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0170","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0170","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0171","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in syslog by sending it a large number of superfluous messages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0171","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0171","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0173","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FormMail CGI program can be used by web servers other than the host server that the program resides on."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formmail:*:*:*:*:*:*:*:*","matchCriteriaId":"0D0DEA87-03B6-4290-ACE7-C5A19F68543B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0173","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0173","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0178","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the win-c-sample program (win-c-sample.exe) in the WebSite web server 1.1e allows remote attackers to execute arbitrary code via a long query string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:oreilly_website:1.1e:*:*:*:*:*:*:*","matchCriteriaId":"D94BA398-D2BD-4A9B-B63E-906331ACAB31"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/1997_1/0021.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/2078","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/295","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/1997_1/0021.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/2078","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/295","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0179","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT crashes or locks up when a Samba client executes a \"cd ..\" command on a file share."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-17"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D0D4EAC2-A948-461F-B5DD-0AE73CF05D29"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ140818","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ140818","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0180","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"in.rshd allows users to login with a NULL username and execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0180","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0180","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0201","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A quote cwd command on FTP servers can reveal the full path of the home directory of the \"ftp\" user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ftp:ftp:*:*:*:*:*:*:*:*","matchCriteriaId":"30D7F58F-4C55-4D19-984C-79B6C9525BEB"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0201","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0201","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0202","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The GNU tar command, when used in FTP sessions, may allow an attacker to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:wu-ftpd:2.4.1:*:*:*:*:*:*:*","matchCriteriaId":"7CD8D2AC-B757-413B-9450-5E0377B166AE"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0202","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0202","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0204","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail 8.6.9 allows remote attackers to execute root commands, using ident."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.6.9:*:*:*:*:*:*:*","matchCriteriaId":"64735DDE-2FA2-4C30-80D7-E5D7764280C4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0204","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0204","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0217","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Malicious option settings in UDP packets could force a reboot in SunOS 4.1.3 systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3c:*:*:*:*:*:*:*","matchCriteriaId":"27C5561B-F8AE-4AD2-BD1C-E9089F315277"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3a1:*:*:*:*:*:*:*","matchCriteriaId":"08BCE3D9-1B13-41DC-8497-F93C41672394"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1psr_a:*:*:*:*:*:*:*","matchCriteriaId":"FF90C17C-5B10-45D4-8296-D00EAFA1EB8E"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0217","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0217","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0236","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ScriptAlias directory in NCSA and Apache httpd allowed attackers to read CGI programs."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*","versionEndExcluding":"1.0","matchCriteriaId":"9A453C77-BCCD-4BE2-BE55-FE5E21F9EEBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:illinois:ncsa_httpd:-:*:*:*:*:*:*:*","matchCriteriaId":"8D345E6D-976C-4D9C-8BF5-E4D41983A548"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0236","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]}]}},{"cve":{"id":"CVE-1999-0249","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT RSHSVC program allows remote users to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0249","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0249","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0251","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in talk program allows remote attackers to disrupt a user's display."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:talkd:talkd:*:*:*:*:*:*:*:*","matchCriteriaId":"55FDFF77-AD14-47CE-8951-06441820BDF1"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0251","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0251","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0252","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in listserv allows arbitrary command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lsoft:listserv:*:*:*:*:*:*:*:*","matchCriteriaId":"4231DEB1-4E80-4513-B267-C5F39EBABD59"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0252","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0252","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0253","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 3.0 with the iis-fix hotfix installed allows remote intruders to read source code for ASP programs by using a %2e instead of a . (dot) in the URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:1.0:*:*:*:*:*:*:*","matchCriteriaId":"6DB3FA68-3ACE-4051-9FD5-34F9A30EB226"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E701AB0D-E335-47DF-A0CA-607D5C6E9255"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1814","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1814","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0265","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ICMP redirect messages may crash or lock up a host."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microware:os-9:*:*:*:*:*:*:*:*","matchCriteriaId":"9AAE6365-E516-4ABD-9FA2-1398F113CEE1"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:3.12:*:*:*:*:*:*:*","matchCriteriaId":"B49AA1BC-2868-4121-87BE-D98330D65A3C"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ154174","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ154174","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0274","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Windows NT DNS servers through malicious packet which contains a response to a query that wasn't made."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0274","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0274","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0345","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Jolt ICMP attack causes a denial of service in Windows 95 and Windows NT systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"44EFD22E-02C9-4B80-8934-A9AC8DD858CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"B1B4D4A5-25EB-48FE-BDFD-A274CE802648"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"F3A037F1-98AD-47CC-8D83-B42666E1B61E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*","matchCriteriaId":"61FEF2E3-1939-42B3-B32F-A22C173A186A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A95C1672-F798-44D2-94A1-19492C395FF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3:*:*:*:*:*:*:*","matchCriteriaId":"66086A58-91FC-4203-B2C2-4B3091A1C548"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5:*:*:*:*:*:*:*","matchCriteriaId":"4EDA6C83-76C9-44F1-94A2-1CBCC7DBBB00"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*","matchCriteriaId":"6FAC4577-5CC1-4099-8CBE-8AD5C1AF3807"},{"vulnerable":true,"criteria":"cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*","matchCriteriaId":"E223FC83-3079-4EB8-940F-5546DCD6F473"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/62170","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/62170","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0496","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT 4.0 user can gain administrative rights by forcing NtOpenProcessToken to succeed regardless of the user's permissions, aka GetAdmin."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ146965","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ146965","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0499","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NETBIOS share information may be published through SNMP registry keys in NT."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0499","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0499","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0503","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT local user or administrator account has a guessable password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0503","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0503","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0504","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT local user or administrator account has a default, null, blank, or missing password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0504","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0504","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0510","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A router or firewall allows source routed packets from arbitrary hosts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0510","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0510","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0511","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IP forwarding is enabled on a machine which is not a router or firewall."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0511","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0511","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0517","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An SNMP community name is the default (e.g. public), null, or missing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0517","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0517","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-244","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-244/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0518","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A NETBIOS/SMB share password is guessable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0518","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0518","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0519","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A NETBIOS/SMB share password is the default, null, or missing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*","matchCriteriaId":"D52F17AB-2C87-4C1A-91B5-267ABBCF5844"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0519","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0519","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0521","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An NIS domain name is easily guessable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-13.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1992-13.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0525","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IP traceroute is allowed from arbitrary hosts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0525","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0525","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0534","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT user has inappropriate rights or privileges, e.g. Act as System, Add Workstation, Backup, Change System Time, Create Pagefile, Create Permanent Object, Create Token Name, Debug, Generate Security Audit, Increase Priority, Increase Quota, Load Driver, Lock Memory, Profile Single Process, Remote Shutdown, Replace Process Token, Restore, System Environment, Take Ownership, or Unsolicited Input."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0534","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0534","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0535","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT account policy for passwords has inappropriate, security-critical settings, e.g. for password length, password age, or uniqueness."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0535","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0535","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0550","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A router's routing tables can be obtained from arbitrary hosts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0550","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0550","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0562","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The registry in Windows NT can be accessed remotely by users who are not administrators."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1023","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1023","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0572","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":".reg files are associated with the Windows NT registry editor (regedit), making the registry susceptible to Trojan Horse attacks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/178","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/178","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0575","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT system's user audit policy does not log an event success or failure, e.g. for Logon and Logoff, File and Object Access, Use of User Rights, User and Group Management, Security Policy Changes, Restart, Shutdown, and System, and Process Tracking."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0575","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0575","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0576","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT system's file audit policy does not log an event success or failure for security-critical files or directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0576","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0576","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0582","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT account policy has inappropriate, security-critical settings for lockout, e.g. lockout duration, lockout after bad logon attempts, etc."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0582","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0582","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0626","sourceIdentifier":"cve@mitre.org","published":"1997-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A version of rusers is running that exposes valid user information to any entity on the network."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:rpc.ruserd:*:*:*:*:*:*:*:*","matchCriteriaId":"D0E77D0D-69A8-4594-AA70-6740147EE52D"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0626","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0626","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"rusers is an unsecured and obsolete protocol and it should be disabled.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-1120","sourceIdentifier":"cve@mitre.org","published":"1997-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"netprint in SGI IRIX 6.4 and earlier trusts the PATH environmental variable for finding and executing the disable program, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.4","matchCriteriaId":"BD2D5C10-ED78-4A1C-B0D1-68F34EAD2614"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420403&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/993","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/395","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2107","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420403&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/993","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/395","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2107","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0051","sourceIdentifier":"cve@mitre.org","published":"1997-01-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Arbitrary file creation and program execution using FLEXlm LicenseManager, from versions 4.0 to 5.0, in IRIX."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:globetrotter:flexlm:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0A52E7F2-2747-41B7-82DB-18ED219149B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:globetrotter:flexlm:4.1:*:*:*:*:*:*:*","matchCriteriaId":"3C41704B-36CA-4E78-A3FF-7280D8F9ED0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:globetrotter:flexlm:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E8CBFF47-05CB-46A4-9807-C38CED519D0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:license_oeo:3.0:*:*:*:*:*:*:*","matchCriteriaId":"382076A2-CB33-435F-B78C-8B776E3F9F9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:license_oeo:3.1:*:*:*:*:*:*:*","matchCriteriaId":"A146CF62-753B-4E2B-8400-490B99EC8E01"},{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:license_oeo:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D8B137D8-29E3-460A-A27E-617C7B195817"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*","matchCriteriaId":"40511481-CD42-4EB7-BE2A-7A78964B7D3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*","matchCriteriaId":"D926CDA1-AF2B-4DED-93AE-8F12091E0B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"536CB843-5FF6-4BC1-A6DA-92A8CB69D6D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"E0B4722F-1FBA-4A73-BF85-5920B94F833D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.1t:*:*:*:*:*:*:*","matchCriteriaId":"B7FD1CEC-9064-483C-A3C2-04E3C50EFBEE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"05B1518A-9BBC-4CDB-8338-4DCC9A1A91D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"C26983FB-6FD7-4938-8025-E535A6505ADF"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.4:*:*:*:*:*:*:*","matchCriteriaId":"52D01CD7-CE53-44D6-82C6-C72579BA089C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.4b:*:*:*:*:*:*:*","matchCriteriaId":"73F04863-29CB-4E0C-838B-1C23E25C129C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.4t:*:*:*:*:*:*:*","matchCriteriaId":"79AA794C-C18F-48A4-ADCB-DC219DF259CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5:*:*:*:*:*:*:*","matchCriteriaId":"4D4B36C0-D3FF-4B33-B810-DB920062480B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5_iop:*:*:*:*:*:*:*","matchCriteriaId":"C03CED73-9451-4DE4-A00A-7EAB24424CC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5_ipr:*:*:*:*:*:*:*","matchCriteriaId":"29446761-8ACE-4E05-82C3-3FF77C1E2CCB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5a:*:*:*:*:*:*:*","matchCriteriaId":"20B3C51E-DE28-4B50-B841-31CCFEA88A1C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5d:*:*:*:*:*:*:*","matchCriteriaId":"A67E6C0C-F5A4-4591-94B9-3D72221C0933"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5e:*:*:*:*:*:*:*","matchCriteriaId":"7CC66EB2-FFC7-4EF1-9591-A5C5E1E7C919"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5f:*:*:*:*:*:*:*","matchCriteriaId":"85D02672-84E9-4036-8ED8-FE6EF4D7E275"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5g:*:*:*:*:*:*:*","matchCriteriaId":"646483C9-6FFC-46FE-B9CD-40D733FABFD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5h:*:*:*:*:*:*:*","matchCriteriaId":"C6B71C71-FA29-4B4C-831C-63AE2797BA2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4jl:*:*:*:*:*:*:*","matchCriteriaId":"44F62CC9-2145-4801-9C3E-4D7232E6BD68"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0051","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0051","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1249","sourceIdentifier":"cve@mitre.org","published":"1997-01-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"movemail in HP-UX 10.20 has insecure permissions, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9701-047.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.osvdb.org/8099","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2057","source":"cve@mitre.org"},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9701-047.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.osvdb.org/8099","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2057","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1145","sourceIdentifier":"cve@mitre.org","published":"1997-01-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Glance programs in GlancePlus for HP-UX 10.20 and earlier allows local users to access arbitrary files and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"10.20","matchCriteriaId":"BBC898E5-04EC-4AF5-ACA3-7080D8AAA493"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/advisory.html?id=1514","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2059","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/advisory.html?id=1514","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2059","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1311","sourceIdentifier":"cve@mitre.org","published":"1997-01-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0049","sourceIdentifier":"cve@mitre.org","published":"1997-01-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Csetup under IRIX allows arbitrary file creation or overwriting."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0049","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0049","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1088","sourceIdentifier":"cve@mitre.org","published":"1997-01-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in chsh command in HP-UX 9.X through 10.20 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"10.02","matchCriteriaId":"E9919679-0F7D-47B7-8F94-49E2DE8DBBCC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2012","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-21.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2012","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0081","sourceIdentifier":"cve@mitre.org","published":"1997-01-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wu-ftp allows files to be overwritten via the rnfr command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:*:*:*:*:*:*:*:*","matchCriteriaId":"E0326E91-1E2D-4F29-BFEA-11BE48640AE8"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0081","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0081","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0048","sourceIdentifier":"cve@mitre.org","published":"1997-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Talkd, when given corrupt DNS information, can be used to execute arbitrary commands with root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:debian:netkit:0.07:*:*:*:*:*:*:*","matchCriteriaId":"31167082-8255-49DA-A3C2-F1F395DFCF15"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:*:*:*:*:*:*:*:*","matchCriteriaId":"81B329CB-C41D-4487-A492-C34DC68899B6"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:*:*:*:*:*:*:*:*","matchCriteriaId":"AADD2657-6791-45DD-95C4-F437FCEF4357"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:up-ux_v:*:*:*:*:*:*:*:*","matchCriteriaId":"B10E6A9A-8C15-4349-AD4F-A24F65991034"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/147","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/147","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0966","sourceIdentifier":"cve@mitre.org","published":"1997-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris getopt in libc allows local users to gain root privileges via a long argv[0]."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0966","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0966","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0047","sourceIdentifier":"cve@mitre.org","published":"1997-01-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.3:*:*:*:*:*:*:*","matchCriteriaId":"9D8484F8-8712-4B55-A163-BA492B4D0095"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.4:*:*:*:*:*:*:*","matchCriteriaId":"D15777E6-6951-4559-B19F-08CE6246BF33"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/685","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/685","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1144","sourceIdentifier":"cve@mitre.org","published":"1997-01-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain files in MPower in HP-UX 10.x are installed with insecure permissions, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9701-051.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2056","source":"cve@mitre.org"},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9701-051.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2056","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0174","sourceIdentifier":"cve@mitre.org","published":"1997-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The view-source CGI program allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*","matchCriteriaId":"494AFC1E-67A3-41CA-B920-B8F778B68A99"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*","matchCriteriaId":"34F6328B-44A8-4E45-918E-C54285040BFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*","matchCriteriaId":"529E3F71-6016-461D-A162-0DBDD5505389"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*","matchCriteriaId":"31D02C4D-3FD1-425F-B0DB-7808089BCD0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*","matchCriteriaId":"918BE44C-8D64-4040-BC74-802AA3FA4E10"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0174","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0174","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0309","sourceIdentifier":"cve@mitre.org","published":"1997-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP-UX vgdisplay program gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9702-056","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9702-056","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0369","sourceIdentifier":"cve@mitre.org","published":"1997-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Sun sdtcm_convert calendar utility for OpenWindows has a buffer overflow which can gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*","matchCriteriaId":"FEEC0C5A-4A6E-403C-B929-D1EC8B0FE2A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:1.1.3:u1:*:*:*:*:*:*","matchCriteriaId":"D3373737-C6FC-4D19-845C-B0382AE1DC48"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:1.1.4:*:jl:*:*:*:*:*","matchCriteriaId":"10EC0267-500D-496F-9D88-7F93F7D4A88B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/183","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/183","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0959","sourceIdentifier":"cve@mitre.org","published":"1997-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IRIX startmidi program allows local users to modify arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8447","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/469","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1634","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8447","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/469","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1634","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1160","sourceIdentifier":"cve@mitre.org","published":"1997-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in ftpd/kftpd in HP-UX 10.x and 9.x allows local and possibly remote users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-33.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420581&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7437.php","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-33.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420581&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7437.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1299","sourceIdentifier":"cve@mitre.org","published":"1997-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rcp on various Linux systems including Red Hat 4.0 allows a \"nobody\" user or other user with UID of 65535 to overwrite arbitrary files, since 65535 is interpreted as -1 by chown and other system calls, which causes the calls to fail to modify the ownership of the file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.1:*:*:*:*:*:*:*","matchCriteriaId":"9FDBA67D-84A7-42D6-A994-7C967B6306D3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420509&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420509&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0298","sourceIdentifier":"cve@mitre.org","published":"1997-02-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ypbind with -ypset and -ypsetme options activated in Linux Slackware and SunOS allows local and remote attackers to overwrite files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"F3698FC7-C9A6-4AA5-8569-CF96128A63AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"A5A8D289-2310-4583-95F0-0CB940B6CBF1"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:2.3:*:*:*:*:*:*:*","matchCriteriaId":"6325268D-C355-4DD3-A839-6C3CF5435B0C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]}]}],"references":[{"url":"http://www.nai.com/nai_labs/asp_set/advisory/06_ypbindsetme_adv.asp","source":"cve@mitre.org"},{"url":"http://www.nai.com/nai_labs/asp_set/advisory/06_ypbindsetme_adv.asp","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0046","sourceIdentifier":"cve@mitre.org","published":"1997-02-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow of rlogin program using TERM environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*","matchCriteriaId":"2F5E922C-239D-4F98-87ED-BB7998BE99C5"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DD254562-D74A-4D7C-B846-E242D785B830"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"BBFBCFEE-C24C-4D38-83F9-810E05D27901"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:0.93:*:*:*:*:*:*:*","matchCriteriaId":"E1E1BD95-EF97-4CA0-9EF1-5081DD5F782B"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:-:*:*:*:*:*:*:*","matchCriteriaId":"8D2066A9-7DAE-403C-8C12-5414C6770F8D"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*","matchCriteriaId":"2170549C-80D2-4FF8-AC07-BD4124125B02"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*","matchCriteriaId":"066D4E93-366F-42D4-B27D-8AF981F5F2AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*","matchCriteriaId":"CFD50216-90AC-480E-A11C-E88E64C6D84A"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:-:*:*:*:*:*:*:*","matchCriteriaId":"8772D1A6-9458-499F-B9E7-758A6DA735B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:*:*","matchCriteriaId":"91F372EA-3A78-4703-A457-751B2C98D796"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:2.5.1:*:*:*:*:*:*:*","matchCriteriaId":"A57664FD-9E75-4F9B-92C4-7D85A263D04B"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"69C7B4A8-E8D0-425C-B979-17E85458B0C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*","matchCriteriaId":"0F538D2B-1AE1-4766-830E-CF7999181128"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*","matchCriteriaId":"722A52CF-4C6E-44D3-90C4-D2F72A40EF58"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0046","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0046","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0228","sourceIdentifier":"cve@mitre.org","published":"1997-02-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in RPCSS.EXE program (RPC Locator) in Windows NT."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ162567","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ162567","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0109","sourceIdentifier":"cve@mitre.org","published":"1997-02-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ffbconfig in Solaris 2.5.1."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/140","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/140","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0041","sourceIdentifier":"cve@mitre.org","published":"1997-02-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NLS (Natural Language Service)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:libc:5.0.9:*:*:*:*:*:*:*","matchCriteriaId":"E0EE0514-E70B-43D8-ADBA-B0A3BCD8B44D"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:libc:5.2.18:*:*:*:*:*:*:*","matchCriteriaId":"BBB49C49-1AC9-48C5-906E-05E67DC99BB9"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:libc:5.3.12:*:*:*:*:*:*:*","matchCriteriaId":"03EFCDE7-4C23-43A5-B34B-EB2EC73481CF"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:1.5:*:mk:*:*:*:*:*","matchCriteriaId":"71CAA155-04D6-4FDF-BE79-EE5AFD0B55A0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:9.0:*:*:*:*:*:*:*","matchCriteriaId":"FFB0C892-B2B2-4810-A009-AE1809730FE6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:9.2:*:*:*:*:*:*:*","matchCriteriaId":"D4029356-417F-4738-ACE0-B88351EA9010"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos_max:1.3:*:*:*:*:*:*:*","matchCriteriaId":"56C16675-1822-4B1B-8BE0-D7FC7FA106D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.1:*:*:*:*:*:*:*","matchCriteriaId":"9FDBA67D-84A7-42D6-A994-7C967B6306D3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0041","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0041","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0868","sourceIdentifier":"cve@mitre.org","published":"1997-02-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ucbmail allows remote attackers to execute commands via shell metacharacters that are passed to it from INN."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"5658CF74-5AF1-4161-BF4C-6A394F2AA164"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:news_server:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A0FB9EFB-F5C3-447B-A1B7-DB762F93D8F2"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:sparc:*:*:*:*:*:*:*:*","matchCriteriaId":"727D196F-786C-4C50-BF72-BE9E14A243EA"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_intrasv:r1.1:*:*:*:*:*:*:*","matchCriteriaId":"D6CA81EB-5910-454D-AB36-B3EF80CDC44F"},{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_networksv:r1.2:*:*:*:*:*:*:*","matchCriteriaId":"D66E31D1-4E06-49FC-AF8C-2904F8776CDD"},{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_networksv:r2.2:*:*:*:*:*:*:*","matchCriteriaId":"289D9EB9-46B7-4176-B5EC-65768A18CAC3"},{"vulnerable":true,"criteria":"cpe:2.3:h:nec:goah_networksv:r3.1:*:*:*:*:*:*:*","matchCriteriaId":"EF85EE71-0A56-4F40-A90C-976541C8F33F"}]}]}],"references":[{"url":"https://www.cs.ait.ac.th/joomla3/index.php/security-advisories?CERT/CA97/msg00027.shtml","source":"cve@mitre.org"},{"url":"https://www.cs.ait.ac.th/joomla3/index.php/security-advisories?CERT/CA97/msg00027.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0105","sourceIdentifier":"cve@mitre.org","published":"1997-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"finger allows recursive searches by using a long string of @ symbols."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0105","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0105","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0106","sourceIdentifier":"cve@mitre.org","published":"1997-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Finger redirection allows finger bombs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0106","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0106","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0165","sourceIdentifier":"cve@mitre.org","published":"1997-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NFS cache poisoning."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:nfs:*:*:*:*:*:*:*:*","matchCriteriaId":"A53226D2-00D1-4D69-AF1A-A9EBD5B7DE5F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7932DF-A035-4506-9BF1-C733DC5DD872"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*","matchCriteriaId":"BDE2EAC5-0657-48FD-B4F8-D2DB6AABAE4F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3791C6C1-2B30-4746-B4D5-A728914C3589"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1C25D2DE-7ED7-47E3-A49F-1F42B57500CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"5FF99415-1F8D-4926-BB55-240B1F116800"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0165","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0165","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0318","sourceIdentifier":"cve@mitre.org","published":"1997-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in xmcd 2.0p12 allows local users to gain access through an environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*","matchCriteriaId":"87FB80D8-1BE7-46F7-9F7E-B7DA88D039F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4:*:*:*:*:*:*:*","matchCriteriaId":"0BAE3D61-9D78-46D7-87EB-5A33ECF86F83"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","matchCriteriaId":"A2475113-CFE4-41C8-A86F-F2DA6548D224"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0318","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0318","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0612","sourceIdentifier":"cve@mitre.org","published":"1997-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A version of finger is running that exposes valid user information to any entity on the network."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:finger_service:*:*:*:*:*:*:*:*","matchCriteriaId":"8572DBD7-169E-4012-A5BA-4E50412526E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*","matchCriteriaId":"843643A1-2F59-4F76-8E94-B45C88806345"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0612","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0612","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The FTP Service should be disabled because it could reveal information about a host's users, which could be used as reconnaissance information for attacks.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-1128","sourceIdentifier":"cve@mitre.org","published":"1997-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 3.01 on Windows 95 allows remote malicious web sites to execute arbitrary commands via a .isp file, which is automatically downloaded and executed without prompting the user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"F62AC866-A06F-47DB-AEDF-E345CE0B14A4"}]}]}],"references":[{"url":"http://members.tripod.com/~unibyte/iebug3.htm","source":"cve@mitre.org"},{"url":"http://oliver.efri.hr/~crv/security/bugs/NT/ie3.html","source":"cve@mitre.org"},{"url":"http://members.tripod.com/~unibyte/iebug3.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://oliver.efri.hr/~crv/security/bugs/NT/ie3.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1489","sourceIdentifier":"cve@mitre.org","published":"1997-03-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in TestChip function in XFree86 SuperProbe in Slackware Linux 3.1 allows local users to gain root privileges via a long -nopr argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.1:*:*:*:*:*:*:*","matchCriteriaId":"9FDBA67D-84A7-42D6-A994-7C967B6306D3"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/6384","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/364","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/6384","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/364","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0299","sourceIdentifier":"cve@mitre.org","published":"1997-03-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD lpd through long DNS hostnames."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"}]}]}],"references":[{"url":"http://www.osvdb.org/6093","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6093","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1408","sourceIdentifier":"cve@mitre.org","published":"1997-03-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in AIX 4.1.4 and HP-UX 10.01 and 9.05 allows local users to cause a denial of service (crash) by using a socket to connect to a port on the localhost, calling shutdown to clear the socket, then using the same socket to connect to a different port on localhost."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420641&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/352","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420641&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/352","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1525","sourceIdentifier":"cve@mitre.org","published":"1997-03-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Macromedia Shockwave before 6.0 allows a malicious webmaster to read a user's mail box and possibly access internal web servers via the GetNextText command on a Shockwave movie."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:macromedia:shockwave_flash_plugin:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0","matchCriteriaId":"38CDD5C2-9AC7-4AC7-BFA7-802968687E62"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420670&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1585","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1586","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/460","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420670&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1585","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1586","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/460","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0280","sourceIdentifier":"cve@mitre.org","published":"1997-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote command execution in Microsoft Internet Explorer using .lnk and .url files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBF9241-A175-438C-A793-3D245BE2AE35"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"F62AC866-A06F-47DB-AEDF-E345CE0B14A4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0280","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0280","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0292","sourceIdentifier":"cve@mitre.org","published":"1997-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service through Winpopup using large user names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0292","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0292","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0315","sourceIdentifier":"cve@mitre.org","published":"1997-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris fdformat command gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/138","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/138","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1387","sourceIdentifier":"cve@mitre.org","published":"1997-04-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 SP2 allows remote attackers to cause a denial of service (crash), possibly via malformed inputs or packets, such as those generated by a Linux smbmount command that was compiled on the Linux 2.0.29 kernel but executed on Linux 2.0.25."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420731&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420732&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420741&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420731&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602167420732&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602167420741&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0042","sourceIdentifier":"cve@mitre.org","published":"1997-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in University of Washington's implementation of IMAP and POP servers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:imap:4:*:*:*:*:*:*:*","matchCriteriaId":"C97FA8D5-1A78-4E3C-BEA8-0C37A9BBE8D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pop:3:*:*:*:*:*:*:*","matchCriteriaId":"2E8FE8B6-213B-48E5-8E62-B2F75AD8F589"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","matchCriteriaId":"99235B00-0050-42BF-99EF-FCDD72D8627D"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"5302613E-F0DD-4B46-884C-49A977FD4147"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0042","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0042","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1298","sourceIdentifier":"cve@mitre.org","published":"1997-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sysinstall in FreeBSD 2.2.1 and earlier, when configuring anonymous FTP, creates the ftp user without a password and with /bin/date as the shell, which could allow attackers to gain access to certain system resources."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.1","matchCriteriaId":"F7A5E8F9-E3C1-47BD-B080-B64985AD2EB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*","matchCriteriaId":"CF4F7002-A525-4A66-BE8B-E50ABBF144B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"}]}]}],"references":[{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-97:03.sysinstall.asc","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7537.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6087","source":"cve@mitre.org"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/old/FreeBSD-SA-97:03.sysinstall.asc","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7537.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6087","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0058","sourceIdentifier":"cve@mitre.org","published":"1997-04-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in PHP cgi program, php.cgi allows shell access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*","matchCriteriaId":"92647629-083F-4042-8365-4AD2EBC9C1BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*","matchCriteriaId":"83BE1120-6370-4470-8586-6581EDF3FD69"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/712","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/712","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0149","sourceIdentifier":"cve@mitre.org","published":"1997-04-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/247","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/373","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/290","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/247","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/373","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/290","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0038","sourceIdentifier":"cve@mitre.org","published":"1997-04-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in xlock program allows local users to execute commands as root."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"CE3A815C-B264-4B1F-8243-894C21F8D1EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"FDB5057F-A306-4250-B247-701948713AD8"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D7E43C99-DEC8-4519-90A9-ADBAA56B99C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"BEC4E336-7290-4FF2-BB71-A1ABDA3283D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"B923A0FC-1F99-40F7-9788-5DF1A757ED27"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"4D9ECBD3-23BA-4832-B3F9-31D2080139CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"C2A6CF60-2BDD-48C3-9A9A-DBBFD153B642"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:0.93:*:*:*:*:*:*:*","matchCriteriaId":"E1E1BD95-EF97-4CA0-9EF1-5081DD5F782B"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A9EDD1D3-6E5C-4D98-9360-33949353BD7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"87E89840-3B57-4CBA-BE90-0BBA61F21F96"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"745ACC17-B6D6-4B4E-9648-A8B45C4A3F7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*","matchCriteriaId":"2170549C-80D2-4FF8-AC07-BD4124125B02"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*","matchCriteriaId":"CFD50216-90AC-480E-A11C-E88E64C6D84A"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0038","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1296","sourceIdentifier":"cve@mitre.org","published":"1997-04-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Kerberos IV compatibility libraries as used in Kerberos V allows local users to gain root privileges via a long line in a kerberos configuration file, which can be specified via the KRB_CONF environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.5.2:*:*:*:*:*:*:*","matchCriteriaId":"2B904DCE-D59F-45C7-A814-DE42CF02792D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420878&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420878&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0040","sourceIdentifier":"cve@mitre.org","published":"1997-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"536CB843-5FF6-4BC1-A6DA-92A8CB69D6D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DD254562-D74A-4D7C-B846-E242D785B830"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"BBFBCFEE-C24C-4D38-83F9-810E05D27901"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*","matchCriteriaId":"C54F7F74-7DD7-431E-AE75-1D1199D63032"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*","matchCriteriaId":"2170549C-80D2-4FF8-AC07-BD4124125B02"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*","matchCriteriaId":"066D4E93-366F-42D4-B27D-8AF981F5F2AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*","matchCriteriaId":"CFD50216-90AC-480E-A11C-E88E64C6D84A"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*","matchCriteriaId":"BF1C22CE-FF69-44CF-82C3-EBFDA9E7EC0E"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*","matchCriteriaId":"EFDDBA47-A0E3-4EB2-868A-A9B998B0154E"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*","matchCriteriaId":"6CF54267-A293-44B1-BD9A-14CD39F732C2"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*","matchCriteriaId":"875BE14D-96DC-4973-B077-40C7DFC75B02"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0040","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0040","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0112","sourceIdentifier":"cve@mitre.org","published":"1997-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX dtterm program for the CDE."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:*:*:*:*:*:*:*:*","matchCriteriaId":"B327A913-CD9E-48F8-B6AE-625AD7D8793A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/878","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/878","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1116","sourceIdentifier":"cve@mitre.org","published":"1997-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in runpriv in Indigo Magic System Administration subsystem of SGI IRIX 6.3 and 6.4 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970503-01-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1009","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/462","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2108","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970503-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1009","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/462","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2108","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1380","sourceIdentifier":"cve@mitre.org","published":"1997-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Symantec Norton Utilities 2.0 for Windows 95 marks the TUNEOCX.OCX ActiveX control as safe for scripting, which allows remote attackers to execute arbitrary commands via the run option through malicious web pages that are accessed by browsers such as Internet Explorer 3.0."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:norton_utilities:2.0:*:*:*:*:*:*:*","matchCriteriaId":"9D0B5B84-4720-4EA2-AAF9-29D5D507514B"}]}]}],"references":[{"url":"http://mlarchive.ima.com/win95/1997/May/0342.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://news.zdnet.co.uk/story/0%2C%2Cs2065518%2C00.html","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7188.php","source":"cve@mitre.org"},{"url":"http://www.net-security.sk/bugs/NT/nu20.html","source":"cve@mitre.org"},{"url":"http://mlarchive.ima.com/win95/1997/May/0342.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://news.zdnet.co.uk/story/0%2C%2Cs2065518%2C00.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7188.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.net-security.sk/bugs/NT/nu20.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1267","sourceIdentifier":"cve@mitre.org","published":"1997-05-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KDE file manager (kfm) uses a TCP server for certain file operations, which allows remote attackers to modify arbitrary files by sending a copy command to the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:*:*:*:*:*:*:*:*","matchCriteriaId":"D54C9BCD-7544-4005-8F61-45C3EC054385"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420906&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1646","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420906&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1646","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0039","sourceIdentifier":"cve@mitre.org","published":"1997-05-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-77"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1997-12.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/235","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/374","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/333","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1997-12.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/235","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/374","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/333","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1067","sourceIdentifier":"cve@mitre.org","published":"1997-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI MachineInfo CGI program, installed by default on some web servers, prints potentially sensitive system status information, which could be used by remote attackers for information gathering activities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420919&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420919&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1398","sourceIdentifier":"cve@mitre.org","published":"1997-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in xfsdump in SGI IRIX may allow local users to obtain root privileges via the bck.log log file, possibly via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420921&w=2","source":"cve@mitre.org"},{"url":"http://www.insecure.org/sploits/irix.xfsdump.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/472","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420921&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.insecure.org/sploits/irix.xfsdump.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/472","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1461","sourceIdentifier":"cve@mitre.org","published":"1997-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"inpview in InPerson on IRIX 5.3 through IRIX 6.5.10 trusts the PATH environmental variable to find and execute the ttsession program, which allows local users to obtain root access by modifying the PATH to point to a Trojan horse ttsession program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*","matchCriteriaId":"60CC9410-F6B8-4748-B76F-30626279028E"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420921&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/381","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20001101-01-I","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420921&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/381","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1286","sourceIdentifier":"cve@mitre.org","published":"1997-05-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"addnetpr in SGI IRIX 6.2 and earlier allows local users to modify arbitrary files and possibly gain root access via a symlink attack on a temporary file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.2","matchCriteriaId":"5B4C48CE-7E12-454C-8DE8-F86976249F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420927&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8560","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/330","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1433","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602167420927&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8560","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/330","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1433","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1410","sourceIdentifier":"cve@mitre.org","published":"1997-05-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"addnetpr in IRIX 5.3 and 6.2 allows local users to overwrite arbitrary files and possibly gain root privileges via a symlink attack on the printers temporary file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420927&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/330","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19961203-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420927&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/330","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1158","sourceIdentifier":"cve@mitre.org","published":"1997-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in (1) pluggable authentication module (PAM) on Solaris 2.5.1 and 2.5 and (2) unix_scheme in Solaris 2.4 and 2.3 allows local users to gain root privileges via programs that use these modules such as passwd, yppasswd, and nispasswd."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-97.09.Solaris.passwd.buffer.overrun.vul","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/139&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-97.09.Solaris.passwd.buffer.overrun.vul","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/139&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1184","sourceIdentifier":"cve@mitre.org","published":"1997-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Elm 2.4 and earlier allows local users to gain privileges via a long TERM environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elm_development_group:elm:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4","matchCriteriaId":"F0E66345-9760-4061-A1D4-24DBF9711740"},{"vulnerable":true,"criteria":"cpe:2.3:a:elm_development_group:elm:2.3:*:*:*:*:*:*:*","matchCriteriaId":"51E0D7CF-6A88-40AC-A113-BD4E69AE07D8"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420967&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420970&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420967&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602167420970&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0962","sourceIdentifier":"cve@mitre.org","published":"1997-05-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in HPUX passwd command allows local users to gain root privileges via a command line option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"}]}]}],"references":[{"url":"http://www.osvdb.org/6415","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9701-045","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6415","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9701-045","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1141","sourceIdentifier":"cve@mitre.org","published":"1997-05-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ascom Timeplex router allows remote attackers to obtain sensitive information or conduct unauthorized activities by entering debug mode through a sequence of CTRL-D characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ascom:timeplex_routers:*:*:*:*:*:*:*:*","matchCriteriaId":"71A33E80-AAFF-428A-908E-39C824954F8B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420981&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1824","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420981&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1824","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1232","sourceIdentifier":"cve@mitre.org","published":"1997-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Untrusted search path vulnerability in day5datacopier in SGI IRIX 6.2 allows local users to execute arbitrary commands via a modified PATH environment variable that points to a malicious cp program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420994&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8559","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3316","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420994&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8559","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3316","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1402","sourceIdentifier":"cve@mitre.org","published":"1997-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The access permissions for a UNIX domain socket are ignored in Solaris 2.x and SunOS 4.x, and other BSD-based operating systems before 4.4, which could allow local users to connect to the socket and possibly disrupt or control the operations of the program using that socket."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","matchCriteriaId":"314BA420-4C74-4060-8ACE-D7A7C041CF2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*","matchCriteriaId":"2EAD7613-A5B3-4621-B981-290C7C6B8BA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","matchCriteriaId":"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2839042D-7706-4059-B069-72E36297ECEB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167418317&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602248718482&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7172.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/456","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167418317&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602248718482&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7172.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/456","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1191","sourceIdentifier":"cve@mitre.org","published":"1997-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in chkey in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"5.5.1","matchCriteriaId":"FB3AF849-6EC6-4C9A-B4AB-91C871FD205B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"}]}]}],"references":[{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-97.18.solaris.chkey.buffer.overflow.vul","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://marc.info/?l=bugtraq&m=87602167418335&w=2","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/144","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7442.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/207","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-97.18.solaris.chkey.buffer.overflow.vul","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://marc.info/?l=bugtraq&m=87602167418335&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/144","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7442.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/207","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1449","sourceIdentifier":"cve@mitre.org","published":"1997-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SunOS 4.1.4 on a Sparc 20 machine allows local users to cause a denial of service (kernel panic) by reading from the /dev/tcx0 TCX device."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]}]}],"references":[{"url":"http://oamk.fi/~jukkao/bugtraq/before-971202/0498.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.insecure.org/sploits/sunos.dev.tcx0.write.wierd.shit.to.device.bug.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://oamk.fi/~jukkao/bugtraq/before-971202/0498.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.insecure.org/sploits/sunos.dev.tcx0.write.wierd.shit.to.device.bug.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0037","sourceIdentifier":"cve@mitre.org","published":"1997-05-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Arbitrary command execution via metamail package using message headers, when user processes attacker's message using metamail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"B133DAC8-2B0D-4F83-9025-AD071740187A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0037","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0037","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0259","sourceIdentifier":"cve@mitre.org","published":"1997-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"cfingerd lists all users on a system via search.**@target."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:infodrom:cfingerd:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"F57CBC3C-0709-48A5-9DCA-2055681F378F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0259","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0259","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0036","sourceIdentifier":"cve@mitre.org","published":"1997-05-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IRIX login program with a nonzero LOCKOUT parameter allows creation or damage to files."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-434"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/h-106.shtml","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/990","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/557","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970508-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/h-106.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/990","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/557","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0064","sourceIdentifier":"cve@mitre.org","published":"1997-05-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX lquerylv program gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=87602167418428&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=87602167418428&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1143","sourceIdentifier":"cve@mitre.org","published":"1997-05-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in runtime linker program rld in SGI IRIX 6.x and earlier allows local users to gain privileges via setuid and setgid programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0","matchCriteriaId":"6969163C-88F4-4C1C-AD32-FB4801C39E01"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-65.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2109","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970504-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-65.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2109","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0034","sourceIdentifier":"cve@mitre.org","published":"1997-05-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in suidperl (sperl), Perl 4.x and 5.x."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:larry_wall:perl:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C6D64BFC-E974-460C-A635-7319676049A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:freeware:1.0:*:*:*:*:*:*:*","matchCriteriaId":"E7970668-A80C-461D-A779-A8A6880D319B"},{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:freeware:2.0:*:*:*:*:*:*:*","matchCriteriaId":"A3D6C767-472A-4C09-B06F-C73537E764DD"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","matchCriteriaId":"99235B00-0050-42BF-99EF-FCDD72D8627D"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0034","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0034","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0035","sourceIdentifier":"cve@mitre.org","published":"1997-05-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Race condition in signal handling routine in ftpd, allowing read/write arbitrary files."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-364"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*","matchCriteriaId":"679EB37A-DC20-4EB0-BF1E-664BF53AC054"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0035","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0035","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0144","sourceIdentifier":"cve@mitre.org","published":"1997-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Qmail by specifying a large number of recipients with the RCPT command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qmail_project:qmail:-:*:*:*:*:*:*:*","matchCriteriaId":"6FA9D55F-8FDA-4B2C-BE43-82BDFEED1C7D"}]}]}],"references":[{"url":"http://cr.yp.to/qmail/venema.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602558319024&w=2","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602558319029&w=2","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.ornl.gov/its/archives/mailing-lists/qmail/1997/06/threads.html","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/2237","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/208","source":"cve@mitre.org","tags":["VDB Entry"]},{"url":"http://cr.yp.to/qmail/venema.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602558319024&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602558319029&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.ornl.gov/its/archives/mailing-lists/qmail/1997/06/threads.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/2237","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0227","sourceIdentifier":"cve@mitre.org","published":"1997-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Access violation in LSASS.EXE (LSA/LSARPC) program in Windows NT allows a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ154087","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ154087","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0281","sourceIdentifier":"cve@mitre.org","published":"1997-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in IIS using long URLs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E701AB0D-E335-47DF-A0CA-607D5C6E9255"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0281","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0281","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0799","sourceIdentifier":"cve@mitre.org","published":"1997-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in bootpd 2.4.3 and earlier via a long boot file location."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cmu:bootpd:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4.3","matchCriteriaId":"984D8FBF-5040-4E9F-A3D1-6CB5FA14DE0A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0799","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0799","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0189","sourceIdentifier":"cve@mitre.org","published":"1997-06-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/142","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/142","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0275","sourceIdentifier":"cve@mitre.org","published":"1997-06-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Windows NT DNS servers by flooding port 53 with too many characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0275","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0275","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0083","sourceIdentifier":"cve@mitre.org","published":"1997-06-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"getcwd() file descriptor leak in FTP."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0083","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0083","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0033","sourceIdentifier":"cve@mitre.org","published":"1997-06-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Command execution in Sun systems via buffer overflow in the at program."},{"lang":"es","value":"Ejecución de comandos en sistemas Sun mediante desbordamiento de tampón en el programa 'at'"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncr:mp-ras:3.0:*:*:*:*:*:*:*","matchCriteriaId":"28ADAFCA-AD99-40C7-B4C0-1BA5D3DB98F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","matchCriteriaId":"F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7363FF35-7C67-40DC-AD38-74FD6264BF5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:3.2v4:*:*:*:*:*:*:*","matchCriteriaId":"4D1A26B2-C13B-42D8-8E91-0D4979641865"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*","matchCriteriaId":"D1DEB967-BD3E-4CCF-B53F-3927454FA689"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*","matchCriteriaId":"1C89DF53-2038-487A-A08F-8D705B7BFB27"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0033","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1266","sourceIdentifier":"cve@mitre.org","published":"1997-06-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rsh daemon (rshd) generates different error messages when a valid username is provided versus an invalid name, which allows remote attackers to determine valid users on the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:metamail_corporation:metamail:*:*:*:*:*:*:*:*","versionEndIncluding":"7.2","matchCriteriaId":"CB6F8DFB-5EA4-4572-9BCF-5D0ECD56DB6C"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/6978","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1660","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/6978","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1660","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0957","sourceIdentifier":"cve@mitre.org","published":"1997-06-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MajorCool mj_key_cache program allows local users to modify files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majorcool:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.3","matchCriteriaId":"D8ED2EA0-60FA-4640-A5C3-8490579F1894"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0957","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0957","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1483","sourceIdentifier":"cve@mitre.org","published":"1997-06-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in zgv in svgalib 1.2.10 and earlier allows local users to execute arbitrary code via a long HOME environment variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:svgalib:svgalib:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.10","matchCriteriaId":"D7A469AF-9087-46D8-9FEF-794233240927"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/7041","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/7041","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1192","sourceIdentifier":"cve@mitre.org","published":"1997-06-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in eeprom in Solaris 2.5.1 and earlier allows local users to gain root privileges via a long command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"5.5.1","matchCriteriaId":"FB3AF849-6EC6-4C9A-B4AB-91C871FD205B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/143","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7444.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/206","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/143","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7444.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/206","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1423","sourceIdentifier":"cve@mitre.org","published":"1997-06-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602558319160&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602558319171&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602558319180&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602558319181&w=2","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/146","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7492.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/209","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602558319160&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602558319171&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602558319180&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602558319181&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/146","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7492.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/209","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0074","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Listening TCP ports are sequentially allocated, allowing spoofing attacks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0074","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0074","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0076","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in wu-ftp from PASV command causes a core dump."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:*:*:*:*:*:*:*:*","matchCriteriaId":"E0326E91-1E2D-4F29-BFEA-11BE48640AE8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0076","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0076","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0111","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RIP v1 is susceptible to spoofing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0111","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0111","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0147","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_arizona:glimpse_http:2.0:*:*:*:*:*:*:*","matchCriteriaId":"BA9C6AF0-8D18-438C-AAD7-95DA845CF774"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_arizona:webglimpse:*:*:*:*:*:*:*:*","versionEndIncluding":"1.5","matchCriteriaId":"99323BCA-FBDE-4B82-BD27-59626A5AAFC8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0147","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0147","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0150","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Perl fingerd program allows arbitrary command execution from remote users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*","matchCriteriaId":"843643A1-2F59-4F76-8E94-B45C88806345"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0150","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0150","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0153","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"}]}]}],"references":[{"url":"http://www.osvdb.org/1666","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1666","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0156","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wu-ftpd FTP daemon allows any user and password combination."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:*:*:*:*:*:*:*:*","matchCriteriaId":"E0326E91-1E2D-4F29-BFEA-11BE48640AE8"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0156","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0156","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0169","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NFS allows attackers to read and write any file on the system by specifying a false UID."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:nfs:*:*:*:*:*:*:*:*","matchCriteriaId":"A53226D2-00D1-4D69-AF1A-A9EBD5B7DE5F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0169","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0169","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0184","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When compiled with the -DALLOW_UPDATES option, bind allows dynamic updates to the DNS server, allowing for malicious modification of DNS records."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:9.4.0:*:*:*:*:*:*:*","matchCriteriaId":"6D7C7524-6943-4D94-8835-0221F0F0CD63"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0184","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0184","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0195","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0195","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0195","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0219","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FTP Serv-U 2.5 allows remote authenticated users to cause a denial of service (crash) via a long (1) CWD or (2) LS (list) command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cat_soft:serv-u:2.5:*:*:*:*:*:*:*","matchCriteriaId":"10A8CC65-6AD3-4CB4-A8D7-F91DC9048F7B"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92574916930144&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92582581330282&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/269","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/205","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92574916930144&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92582581330282&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/269","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/205","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0250","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Qmail through long SMTP commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dan_bernstein:qmail:*:*:*:*:*:*:*:*","versionEndIncluding":"1.01","matchCriteriaId":"0727C0E9-5394-4DDE-9AAD-97C8E285B249"}]}]}],"references":[{"url":"http://cr.yp.to/qmail/venema.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602558319024&w=2","source":"cve@mitre.org"},{"url":"http://www.ornl.gov/its/archives/mailing-lists/qmail/1997/06/threads.html","source":"cve@mitre.org"},{"url":"http://cr.yp.to/qmail/venema.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602558319024&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ornl.gov/its/archives/mailing-lists/qmail/1997/06/threads.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0526","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An X server's access control is disabled (e.g. through an \"xhost +\" command) and allows anyone to connect to the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:7.1_1.1.0:*:*:*:*:*:*:*","matchCriteriaId":"3D3375E2-8CDA-45BB-9533-0C919108B8EF"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/704969","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/704969","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]}]}},{"cve":{"id":"CVE-1999-0532","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A DNS server allows zone transfers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0532","source":"cve@mitre.org"},{"url":"http://www.us-cert.gov/ncas/alerts/TA15-103A","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0532","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0533","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A DNS server allows inverse queries."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0533","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0533","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0541","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A password for accessing a WWW URL is guessable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0541","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0541","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0628","sourceIdentifier":"cve@mitre.org","published":"1997-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rwho/rwhod service is running, which exposes machine status and user information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1326","sourceIdentifier":"cve@mitre.org","published":"1997-07-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wu-ftpd 2.4 FTP server does not properly drop privileges when an ABOR (abort file transfer) command is executed during a file transfer, which causes a signal to be handled incorrectly and allows local and possibly remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"A86BB4F6-210F-448A-A3CB-127BEB5BD0D2"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167420401&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420408&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7169","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420401&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602167420408&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7169","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0031","sourceIdentifier":"cve@mitre.org","published":"1997-07-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"JavaScript in Internet Explorer 3.x and 4.x, and Netscape 2.x, 3.x and 4.x, allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBF9241-A175-438C-A793-3D245BE2AE35"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:2.0:*:*:*:*:*:*:*","matchCriteriaId":"7144D163-CD3D-4E57-83D9-FB164C65E06E"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7CD558FC-D1D7-4092-9A05-B174CA06675D"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF"}]}]}],"references":[{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9707-065.html","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9707-065.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]}]}},{"cve":{"id":"CVE-1999-0196","sourceIdentifier":"cve@mitre.org","published":"1997-07-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"websendmail in Webgais 1.0 allows a remote user to access arbitrary files and execute arbitrary code via the receiver parameter ($VAR_receiver variable)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webgais_development_team:webgais:1.0:*:*:*:*:*:*:*","matchCriteriaId":"64962BF8-4FB6-4961-A3D1-A1C6877B5A50"}]}]}],"references":[{"url":"http://www.osvdb.org/237","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/2077","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/237","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/2077","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0176","sourceIdentifier":"cve@mitre.org","published":"1997-07-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Webgais program allows a remote user to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webgais_development_team:webgais:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0b2","matchCriteriaId":"41824BA4-C6FF-4928-B953-B11BF92D32B4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0176","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0176","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1463","sourceIdentifier":"cve@mitre.org","published":"1997-07-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 before SP3 allows remote attackers to bypass firewall restrictions or cause a denial of service (crash) by sending improperly fragmented IP packets without the first fragment, which the TCP/IP stack incorrectly reassembles into a valid session."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:sp3:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"E2D64573-E3F4-488D-B15E-2715AC2526AE"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/7219","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/528","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/7219","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/528","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0059","sourceIdentifier":"cve@mitre.org","published":"1997-07-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IRIX fam service allows an attacker to obtain a list of all files on the server."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L","baseScore":7.3,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"LOW","availabilityImpact":"LOW"},"exploitabilityScore":3.9,"impactScore":3.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:N/A:N","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]}],"references":[{"url":"http://www.osvdb.org/164","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/353","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/325","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/164","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/353","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/325","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0146","sourceIdentifier":"cve@mitre.org","published":"1997-07-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:campas:*:*:*:*:*:*:*:*","matchCriteriaId":"6F80F679-0A77-476D-A6F8-DD785F31D968"},{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:servers:*:*:*:*:*:*:*:*","matchCriteriaId":"1205A701-E354-41F3-8028-F951547420BA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1975","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/298","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1975","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/298","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0025","sourceIdentifier":"cve@mitre.org","published":"1997-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"root privileges via buffer overflow in df command on SGI IRIX systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1997-21.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/20851","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/bid/346","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/440","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1997-21.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/20851","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/bid/346","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/440","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0026","sourceIdentifier":"cve@mitre.org","published":"1997-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"root privileges via buffer overflow in pset command on SGI IRIX systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0026","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0026","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0027","sourceIdentifier":"cve@mitre.org","published":"1997-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"root privileges via buffer overflow in eject command on SGI IRIX systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0027","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0027","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0028","sourceIdentifier":"cve@mitre.org","published":"1997-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"root privileges via buffer overflow in login/scheme command on SGI IRIX systems."},{"lang":"es","value":"privilegios de administrador mediante un desbordamiento de búfer en el comando login/scheme en sistemas SGI IRIX."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0028","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0028","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0029","sourceIdentifier":"cve@mitre.org","published":"1997-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"root privileges via buffer overflow in ordist command on SGI IRIX systems."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0029","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0029","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0030","sourceIdentifier":"cve@mitre.org","published":"1997-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"root privileges via buffer overflow in xlock command on SGI IRIX systems."},{"lang":"es","value":"Obtención de privilegios de root mediante un desbordamiento de buffer en el comando xlock en sistemas SGI IRIX"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0030","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0030","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1182","sourceIdentifier":"cve@mitre.org","published":"1997-07-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in run-time linkers (1) ld.so or (2) ld-linux.so for Linux systems allows local users to gain privileges by calling a setuid program with a long program name (argv[0]) and forcing ld.so/ld-linux.so to report an error."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:delix:dld:5.2:*:*:*:*:*:*:*","matchCriteriaId":"8B149610-0B27-4CE2-8A2E-D460529B524F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux_lite:1.1:*:*:*:*:*:*:*","matchCriteriaId":"183C974A-3C40-4DB0-8883-76C589873422"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F92AB32-E7DE-43F4-B877-1F41FA162EC7"},{"vulnerable":true,"criteria":"cpe:2.3:o:lst:lst_power_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"DABB88D7-AF77-4460-B5FD-23CB2CDE280D"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"830D48B8-D21D-4D31-99A1-20C231804DBE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602661419318&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602661419351&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88661732807795&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602661419318&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602661419351&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=88661732807795&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0122","sourceIdentifier":"cve@mitre.org","published":"1997-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX lchangelv gives root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0122","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0122","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0247","sourceIdentifier":"cve@mitre.org","published":"1997-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in nnrpd program in INN up to version 1.6 allows remote users to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4:*:*:*:*:*:*:*","matchCriteriaId":"BFA721E1-1ED5-4855-9305-5BF6EAE84A8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4sec:*:*:*:*:*:*:*","matchCriteriaId":"E5D0063D-01CE-49E2-A19A-FA861F3C40CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4sec2:*:*:*:*:*:*:*","matchCriteriaId":"967E86C5-3635-49FF-A98A-C9B2BC85A812"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4unoff3:*:*:*:*:*:*:*","matchCriteriaId":"14DBB010-4064-4B46-834C-6FD5F1FE78FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.4unoff4:*:*:*:*:*:*:*","matchCriteriaId":"EEE0D317-4F02-4896-95FC-20B64EB3A91F"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.5:*:*:*:*:*:*:*","matchCriteriaId":"9915A668-8E8C-4EC8-A72A-6937EC7D3496"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"5658CF74-5AF1-4161-BF4C-6A394F2AA164"}]}]}],"references":[{"url":"http://www.nai.com/nai_labs/asp_set/advisory/17_inn_avd.asp","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1443","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.nai.com/nai_labs/asp_set/advisory/17_inn_avd.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1443","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1208","sourceIdentifier":"cve@mitre.org","published":"1997-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ping in AIX 4.2 and earlier allows local users to gain root privileges via a long command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602661419330&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602661419337&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/803","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602661419330&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602661419337&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/803","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0971","sourceIdentifier":"cve@mitre.org","published":"1997-07-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Exim allows local users to gain root privileges via a long :include: option in a .forward file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_cambridge:exim:*:*:*:*:*:*:*:*","versionEndIncluding":"1.62","matchCriteriaId":"7DDCEFC3-A54C-4F55-ABB0-DA7299D5A8CF"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/7301","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/7301","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1068","sourceIdentifier":"cve@mitre.org","published":"1997-07-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Oracle Webserver 2.1, when serving PL/SQL stored procedures, allows remote attackers to cause a denial of service via a long HTTP GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:2.1:*:*:*:*:*:*:*","matchCriteriaId":"6E2CAB4B-7CF6-4671-8E3C-5CA57B935403"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602661419366&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602661419366&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1217","sourceIdentifier":"cve@mitre.org","published":"1997-07-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The PATH in Windows NT includes the current working directory (.), which could allow local users to gain privileges by placing Trojan horse programs with the same name as commonly used system programs into certain directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=87602726319426&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=87602726319435&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/526","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=87602726319426&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=87602726319435&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/526","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1419","sourceIdentifier":"cve@mitre.org","published":"1997-07-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in nss_nisplus.so.1 library in NIS+ in Solaris 2.3 and 2.4 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/148","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7535.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/219","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/148","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7535.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/219","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1308","sourceIdentifier":"cve@mitre.org","published":"1997-07-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Certain programs in HP-UX 10.20 do not properly handle large user IDs (UID) or group IDs (GID) over 60000, which could allow local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-09.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-91.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-91.shtml","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7594.php","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-09.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-91.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-91.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7594.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0238","sourceIdentifier":"cve@mitre.org","published":"1997-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"php.cgi allows attackers to read any file on the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*","matchCriteriaId":"92647629-083F-4042-8365-4AD2EBC9C1BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*","matchCriteriaId":"FF72E8D5-9F8C-4BD4-9AA4-28E23CB48A47"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*","matchCriteriaId":"83BE1120-6370-4470-8586-6581EDF3FD69"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0238","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0238","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0301","sourceIdentifier":"cve@mitre.org","published":"1997-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SunOS/Solaris ps command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/149","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/149","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0524","sourceIdentifier":"cve@mitre.org","published":"1997-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ICMP information such as (1) netmask and (2) timestamp is allowed from arbitrary hosts."},{"lang":"es","value":"Información ICMP como (1) máscara de red y (2) marca de tiempo está permitida desde hosts arbitrarios."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"},{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:*","matchCriteriaId":"4781BF1E-8A4E-4AFF-9540-23D523EE30DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*","matchCriteriaId":"387021A0-AF36-463C-A605-32EA7DAC172E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*","matchCriteriaId":"B6230A85-30D2-4934-A8A0-11499B7B09F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:-:*:*:*:*:*:*:*","matchCriteriaId":"F480AA32-841A-4E68-9343-B2E7548B0A0C"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:tru64:-:*:*:*:*:*:*:*","matchCriteriaId":"06E97148-F1B2-40FB-9C98-AB9FBE867DE7"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*","matchCriteriaId":"E492C463-D76E-49B7-A4D4-3B499E422D89"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:os2:-:*:*:*:*:*:*:*","matchCriteriaId":"602ECD33-560E-4CDD-8396-7B6EC002C10A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","matchCriteriaId":"703AF700-7A70-47E2-BC3A-7FD03B3CA9C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*","matchCriteriaId":"A2572D17-1DE6-457B-99CC-64AFD54487EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:-:*:*:*:*:*:*:*","matchCriteriaId":"61BD8560-99BE-46E5-8366-7CD9CD3427E6"},{"vulnerable":true,"criteria":"cpe:2.3:o:oracle:solaris:-:*:*:*:*:*:-:*","matchCriteriaId":"F5027746-8216-452D-83C5-2F8E9546F2A5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:sco_unix:-:*:*:*:*:*:*:*","matchCriteriaId":"97A1D7CF-430A-4348-AC21-DB4BA7FD59F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:-:*:*:*:*:*:*:*","matchCriteriaId":"1B522A89-5F4E-4BA1-8AAF-2613C3A6CEE9"},{"vulnerable":true,"criteria":"cpe:2.3:o:windriver:bsdos:-:*:*:*:*:*:*:*","matchCriteriaId":"D0B43723-26A2-40E5-8B2D-B8747CEEA274"}]}]}],"references":[{"url":"http://descriptions.securescout.com/tc/11010","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://descriptions.securescout.com/tc/11011","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1434","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"http://www.osvdb.org/95","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/306","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/322","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://descriptions.securescout.com/tc/11010","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://descriptions.securescout.com/tc/11011","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://kb.vmware.com/selfservice/microsites/search.do?cmd=displayKC&externalId=1434","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"http://www.osvdb.org/95","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/306","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/322","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://support.f5.com/csp/article/K15277","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Red Hat","comment":"Red Hat Enterprise Linux is configured by default to respond to all ICMP requests. Users may configure the firewall to prevent a system from responding to certain ICMP requests.","lastModified":"2010-01-05T00:00:00"}]}},{"cve":{"id":"CVE-1999-0566","sourceIdentifier":"cve@mitre.org","published":"1997-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker can write to syslog files from any location, causing a denial of service by filling up the logs, and hiding activities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","matchCriteriaId":"F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0566","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0566","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1262","sourceIdentifier":"cve@mitre.org","published":"1997-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Java in Netscape 4.5 does not properly restrict applets from connecting to other hosts besides the one from which the applet was loaded, which violates the Java security model and could allow remote attackers to conduct unauthorized activities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.01:*:*:*:*:*:*:*","matchCriteriaId":"3CF253BE-2FCF-40B6-8279-65255833EA36"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*","matchCriteriaId":"34F6328B-44A8-4E45-918E-C54285040BFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*","matchCriteriaId":"31D02C4D-3FD1-425F-B0DB-7808089BCD0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.08:*:*:*:*:*:*:*","matchCriteriaId":"61268CF9-E279-4F63-B228-F9ED4B93BB99"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12231","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1727","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12231","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1727","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1446","sourceIdentifier":"cve@mitre.org","published":"1997-08-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 3 records a history of all URL's that are visited by a user in DAT files located in the Temporary Internet Files and History folders, which are not cleared when the user selects the \"Clear History\" option, and are not visible when the user browses the folders because of tailored displays."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBF9241-A175-438C-A793-3D245BE2AE35"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=87602837719654&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=87602837719655&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=87602837719654&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=87602837719655&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0152","sourceIdentifier":"cve@mitre.org","published":"1997-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The DG/UX finger daemon allows remote command execution through shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:*:*:*:*:*:*:*:*","matchCriteriaId":"CC2E7BDE-DE44-406E-955B-5D70659FA7DF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0152","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0152","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0024","sourceIdentifier":"cve@mitre.org","published":"1997-08-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DNS cache poisoning via BIND, by predictable query IDs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*","matchCriteriaId":"AB7F1274-7E0E-40C8-8006-ACFDBE757D35"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*","matchCriteriaId":"BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","matchCriteriaId":"99235B00-0050-42BF-99EF-FCDD72D8627D"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*","matchCriteriaId":"BF1C22CE-FF69-44CF-82C3-EBFDA9E7EC0E"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*","matchCriteriaId":"EFDDBA47-A0E3-4EB2-868A-A9B998B0154E"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*","matchCriteriaId":"6CF54267-A293-44B1-BD9A-14CD39F732C2"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*","matchCriteriaId":"875BE14D-96DC-4973-B077-40C7DFC75B02"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*","matchCriteriaId":"51756048-EB32-4A72-9ED4-937AF2B9DE37"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0024","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1250","sourceIdentifier":"cve@mitre.org","published":"1997-08-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in CGI program in the Lasso application by Blue World, as used on WebSTAR and other servers, allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:blue_world_communications:lasso_cgi:*:*:*:*:*:*:*:*","matchCriteriaId":"D5D09A50-B19B-491A-AD5E-65DD54BED7F2"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/7506","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2044","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/7506","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2044","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1399","sourceIdentifier":"cve@mitre.org","published":"1997-08-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"spaceball program in SpaceWare 7.3 v1.0 in IRIX 6.2 allows local users to gain root privileges by setting the HOSTNAME environmental variable to contain the commands to be executed."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602746719552&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/471","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602746719552&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/471","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1220","sourceIdentifier":"cve@mitre.org","published":"1997-08-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Majordomo 1.94.3 and earlier allows remote attackers to execute arbitrary commands when the advertise or noadvertise directive is used in a configuration file, via shell metacharacters in the Reply-To header."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:*:*:*:*:*:*:*:*","versionEndIncluding":"1.94.3","matchCriteriaId":"37C9445A-0F39-4664-8F08-F22B17346655"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/7527","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/502","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/7527","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/502","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1225","sourceIdentifier":"cve@mitre.org","published":"1997-08-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.mountd on Linux, Ultrix, and possibly other operating systems, allows remote attackers to determine the existence of a file on the server by attempting to mount that file, which generates different error messages depending on whether the file exists or not."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*","matchCriteriaId":"EE8B41E9-5792-4ADA-A140-2E709321E147"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","matchCriteriaId":"CA3CDD3C-DBA6-4BA2-967D-AD746822F3CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*","matchCriteriaId":"469B74F2-4B89-42B8-8638-731E92D463B9"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/7526","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/347","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/7526","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/347","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0071","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Apache httpd cookie buffer overflow for versions 1.1.1 and earlier."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"4363C07C-179B-4797-947F-7440AD1F2D00"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0071","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0071","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0115","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX bugfiler program allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1800","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1800","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0148","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The handler CGI program in IRIX allows arbitrary command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/380","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19970501-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/380","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0177","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The uploader program in the WebSite web server allows a remote attacker to execute arbitrary programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:website:2.0:*:*:*:*:*:*:*","matchCriteriaId":"2B9C3D18-65A3-4150-859A-4628EB5F7AD3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0177","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0177","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0183","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux implementations of TFTP would allow access to files outside the restricted directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tftp:tftp:*:*:*:*:*:*:*:*","matchCriteriaId":"A3B2D344-2B6C-4BEA-81DB-A562E427DA24"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0183","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0183","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0191","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS newdsn.exe CGI script allows remote users to overwrite files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"}]}]}],"references":[{"url":"http://www.osvdb.org/275","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/275","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0237","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote execution of arbitrary commands through Guestbook CGI program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webcom:cgi_guestbook:*:*:*:*:*:*:*:*","matchCriteriaId":"A1E39DAD-2870-4BB8-A146-061F95AC2D0B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0237","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0237","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1133","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP-UX 9.x and 10.x running X windows may allow local attackers to gain privileges via (1) vuefile, (2) vuepad, (3) dtfile, or (4) dtpad, which do not authenticate users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602880019776&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/499","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602880019776&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/499","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1139","sourceIdentifier":"cve@mitre.org","published":"1997-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Character-Terminal User Environment (CUE) in HP-UX 11.0 and earlier allows local users to overwrite arbitrary files and gain root privileges via a symlink attack on the IOERROR.mytty file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"11.00","matchCriteriaId":"59AD3EDE-3ABD-4686-98CB-42BB56345AE3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602880019745&w=2","source":"cve@mitre.org"},{"url":"http://security-archive.merton.ox.ac.uk/bugtraq-199801/0122.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/i-027b.shtml","source":"cve@mitre.org"},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9801-074.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.iss.net/security_center/static/2007.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602880019745&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security-archive.merton.ox.ac.uk/bugtraq-199801/0122.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/i-027b.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9801-074.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory","URL Repurposed"]},{"url":"http://www.iss.net/security_center/static/2007.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1275","sourceIdentifier":"cve@mitre.org","published":"1997-09-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lotus cc:Mail release 8 stores the postoffice password in plaintext in a hidden file which has insecure permissions, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_cc_mail:8.0:*:*:*:*:*:*:*","matchCriteriaId":"34C7F8F3-8C15-4876-AABA-6DBFA6FE4153"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9478","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1619","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9478","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1619","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0079","sourceIdentifier":"cve@mitre.org","published":"1997-09-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can cause a denial of service in FTP by issuing multiple PASV commands, causing the server to run out of available ports."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bisonware:bisonware_ftp_server:3.5:*:*:*:*:*:*:*","matchCriteriaId":"B55B8B43-4730-48A2-B55F-9CE16725809C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0079","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0079","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1214","sourceIdentifier":"cve@mitre.org","published":"1997-09-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The asynchronous I/O facility in 4.4 BSD kernel does not check user credentials when setting the recipient of I/O notification, which allows local users to cause a denial of service by using certain ioctl and fcntl calls to cause the signal to be sent to an arbitrary process ID."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-255"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:*:*:*:*:*:*:*:*","matchCriteriaId":"B44D379F-F380-42EC-9C9A-A4C8314A4BDF"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*","matchCriteriaId":"3C37EB61-50BE-451A-916B-B05BAC79962B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5CB726CF-ADA2-4CDA-9786-1E84AC53740A"}]}]}],"references":[{"url":"http://www.openbsd.com/advisories/signals.txt","source":"cve@mitre.org"},{"url":"http://www.openbsd.com/advisories/signals.txt","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/11062","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/556","source":"cve@mitre.org"},{"url":"http://www.openbsd.com/advisories/signals.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openbsd.com/advisories/signals.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/11062","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/556","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0667","sourceIdentifier":"cve@mitre.org","published":"1997-09-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:arp_protocol:arp_protocol:*:*:*:*:*:*:*:*","matchCriteriaId":"3701A091-8B0C-4F73-ABF8-20736C631E13"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=87602880019797&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=87602880019797&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0956","sourceIdentifier":"cve@mitre.org","published":"1997-09-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The NeXT NetInfo _writers property allows local users to gain root privileges or conduct a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4902BDC4-9FEC-4EB9-9D93-54FF81AF138C"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:1.0a:*:*:*:*:*:*:*","matchCriteriaId":"D9583554-25FF-46B5-BFA6-5B0F3CEDA725"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:2.0:*:*:*:*:*:*:*","matchCriteriaId":"286C0359-C286-4CA8-B017-046FCE58B544"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:2.1:*:*:*:*:*:*:*","matchCriteriaId":"F2D08ADE-122E-4836-9335-96D153E39128"},{"vulnerable":true,"criteria":"cpe:2.3:o:next:nextstep:3.0:*:*:*:*:*:*:*","matchCriteriaId":"BC203236-BBF4-4D76-B17F-EF03472DBB7D"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0956","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0956","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0965","sourceIdentifier":"cve@mitre.org","published":"1997-09-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Race condition in xterm allows local users to modify arbitrary files via the logging option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:*:*:*:*:*:*:*:*","versionEndExcluding":"5.0","matchCriteriaId":"521AF03D-6C7D-4BF0-8C28-A887F3054E56"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:-:*:*:*:*:*:*","matchCriteriaId":"12EC442A-3481-481A-8927-86771F01A58C"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-01:*:*:*:*:*:*","matchCriteriaId":"13B209F8-CB94-4224-A7FD-118915BA8136"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-02:*:*:*:*:*:*","matchCriteriaId":"CC6E576D-C6FC-409C-BD48-5FC721FE3C39"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-03:*:*:*:*:*:*","matchCriteriaId":"E318087C-875A-49FC-9198-B98E0622F756"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-04:*:*:*:*:*:*","matchCriteriaId":"C0747942-FA57-4FAB-91B6-BA59612C5C38"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-05:*:*:*:*:*:*","matchCriteriaId":"D18A3EDB-8AF8-4AFC-BCDF-983199B16F5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-06:*:*:*:*:*:*","matchCriteriaId":"1A41167C-4BD6-41D8-B1A4-28F6A1664196"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-07:*:*:*:*:*:*","matchCriteriaId":"E99C601A-2B21-4284-8FE9-AF5BE6AF2786"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-08:*:*:*:*:*:*","matchCriteriaId":"673743D8-31CD-459F-A9DA-0D3188FBCEB3"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-09:*:*:*:*:*:*","matchCriteriaId":"3BCE835E-101C-4929-82D4-EA0D66B03607"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-10:*:*:*:*:*:*","matchCriteriaId":"D46F4C68-4462-41F4-B839-336A9AEAFB76"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-11:*:*:*:*:*:*","matchCriteriaId":"041E5856-C20F-4B9A-848C-AF64462385F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-12:*:*:*:*:*:*","matchCriteriaId":"13147C3B-1954-4703-A5FA-32487ED63DBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-13:*:*:*:*:*:*","matchCriteriaId":"35CFF2E5-7F6C-4CFD-85A9-216063878251"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-14:*:*:*:*:*:*","matchCriteriaId":"CD25DE0F-A81C-4797-B66D-0645EC3486F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-15:*:*:*:*:*:*","matchCriteriaId":"754B62CF-5B7D-4E24-A471-ADBFCF096540"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-16:*:*:*:*:*:*","matchCriteriaId":"33571663-B72B-4E53-A715-12409D67D015"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-17:*:*:*:*:*:*","matchCriteriaId":"DD503B54-9000-4BF7-B0AE-7CE9A58D1AA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-18:*:*:*:*:*:*","matchCriteriaId":"801B1D9F-9890-446F-940F-F02A910DF4AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-19:*:*:*:*:*:*","matchCriteriaId":"5587CAA0-BE8A-4F5B-94B1-02097090D8E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-20:*:*:*:*:*:*","matchCriteriaId":"8DEA7068-88C1-4A3B-9A35-2E3DA940C2AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-21:*:*:*:*:*:*","matchCriteriaId":"B81E853E-2F4E-4B07-A191-9A636B868315"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-22:*:*:*:*:*:*","matchCriteriaId":"8552A4FD-5A27-41DD-9C71-6F77E2FAFDEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-23:*:*:*:*:*:*","matchCriteriaId":"BBBDFAC9-FF27-43C1-9295-62ED2AAB3776"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-24:*:*:*:*:*:*","matchCriteriaId":"95F63320-E86F-4DDA-82B5-6958F2E5E85D"},{"vulnerable":true,"criteria":"cpe:2.3:a:x.org:x11:5.0:fix-25:*:*:*:*:*:*","matchCriteriaId":"8C01027A-7DBE-4E9D-A13E-59687BE919E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0965","source":"cve@mitre.org","tags":["VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0965","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry"]}]}},{"cve":{"id":"CVE-1999-1125","sourceIdentifier":"cve@mitre.org","published":"1997-09-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Oracle Webserver 2.1 and earlier runs setuid root, but the configuration file is owned by the oracle account, which allows any local or remote attacker who obtains access to the oracle account to gain privileges or modify arbitrary files by modifying the configuration file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1","matchCriteriaId":"53E647B9-2588-452A-93FF-2B6D1E7F8674"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:http_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"627D0994-5BAE-455A-8413-1FBFD0D2256F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602880019796&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602880019796&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0267","sourceIdentifier":"cve@mitre.org","published":"1997-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NCSA HTTP daemon v1.3 allows remote command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncsa:ncsa_httpd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"6D993B74-BF91-4962-A126-5F2D82CDF946"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0267","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0267","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0282","sourceIdentifier":"cve@mitre.org","published":"1997-09-23T04:00:00.000","lastModified":"2023-11-07T01:54:56.640","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-1584, CVE-1999-1586.  Reason: This candidate combined references from one issue with the description from another issue.  Notes: Users should consult CVE-1999-1584 and CVE-1999-1586 to obtain the appropriate name.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-0955","sourceIdentifier":"cve@mitre.org","published":"1997-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Race condition in wu-ftpd and BSDI ftpd allows remote attackers to gain root access via the SITE EXEC command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.1:*:*:*:*:*:*:*","matchCriteriaId":"28E5257A-F5ED-482C-9A0B-3B576513E7D7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0955","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0955","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0182","sourceIdentifier":"cve@mitre.org","published":"1997-09-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:samba:samba:*:p2:*:*:*:*:*:*","versionEndIncluding":"1.9.17","matchCriteriaId":"B89279AD-AAA6-478D-BAEA-B09D5AC043BB"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/h-110.shtml","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/h-110.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0090","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX rcp command allows local users to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0090","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0090","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0160","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*","matchCriteriaId":"96C6FB91-22FC-4DA9-B19A-8065D8B89F03"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*","matchCriteriaId":"2E9A00D5-A594-4C64-B982-10CB4C554F51"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:10.3:*:*:*:*:*:*:*","matchCriteriaId":"3824A6CC-5C3A-4146-9CDD-B7B213527552"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*","matchCriteriaId":"D626B494-6210-4F74-8D17-BA480B6665C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*","matchCriteriaId":"82B6315D-7BEF-419F-9B93-3CF669E986D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*","matchCriteriaId":"E8026B11-6144-467F-8094-F4F73CD37526"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*","matchCriteriaId":"0DC1411B-4E7E-4F57-B025-9FE27B09C7AC"}]}]}],"references":[{"url":"http://www.osvdb.org/1099","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1099","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0185","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In SunOS or Solaris, a remote user could connect from an FTP server's data port to an rlogin server on a host that trusts the FTP server, allowing remote command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/156","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/156","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0272","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Slmail v2.5 through the POP3 port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:slmail:slmail:3.0.2421:*:*:*:*:*:*:*","matchCriteriaId":"20CDF6A4-B813-4971-AD81-1B493DF03EB1"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0272","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0272","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0294","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"All records in a WINS database can be deleted through SNMP for a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:wins:*:*:*:*:*:*:*:*","matchCriteriaId":"E4E3F978-8439-40C5-B4F2-8DB21941D5FD"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0294","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0294","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0295","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris sysdef command allows local users to read kernel memory, potentially leading to root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/157","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/157","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0300","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"nis_cachemgr for Solaris NIS+ allows attackers to add malicious NIS+ servers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/155","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/155","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0326","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in HP-UX mediainit program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9710-071","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9710-071","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1213","sourceIdentifier":"cve@mitre.org","published":"1997-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in telnet service in HP-UX 10.30 allows attackers to cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"}]}]}],"references":[{"url":"http://www2.dataguard.no/bugtraq/1997_4/0001.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/571","source":"cve@mitre.org"},{"url":"http://www2.dataguard.no/bugtraq/1997_4/0001.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/571","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0061","sourceIdentifier":"cve@mitre.org","published":"1997-10-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"File creation and deletion, and remote execution, in the BSD line printer daemon (lpd)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7932DF-A035-4506-9BF1-C733DC5DD872"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5CB726CF-ADA2-4CDA-9786-1E84AC53740A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0061","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0061","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1061","sourceIdentifier":"cve@mitre.org","published":"1997-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP Laserjet printers with JetDirect cards, when configured with TCP/IP, can be configured without a password, which allows remote attackers to connect to the printer and change its IP address or disable logging."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:hp:jetdirect:*:*:*:*:*:*:*:*","matchCriteriaId":"32DD7F1F-F9EF-495A-8992-110DFB18F88A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602248518480&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1876","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602248518480&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1876","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1062","sourceIdentifier":"cve@mitre.org","published":"1997-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP Laserjet printers with JetDirect cards, when configured with TCP/IP, allow remote attackers to bypass print filters by directly sending PostScript documents to TCP ports 9099 and 9100."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:hp:jetdirect:*:*:*:*:*:*:*:*","matchCriteriaId":"32DD7F1F-F9EF-495A-8992-110DFB18F88A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602248518480&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1876","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602248518480&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1876","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1095","sourceIdentifier":"cve@mitre.org","published":"1997-10-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"sort creates temporary files and follows symbolic links, which allows local users to modify arbitrary files that are writable by the user running sort, as observed in updatedb and other programs that use sort."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*","matchCriteriaId":"06F2131E-F9F2-4E65-B95C-B52DB25C69F5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87619953510834&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88886870129518&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88890116304676&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87619953510834&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=88886870129518&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=88890116304676&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1224","sourceIdentifier":"cve@mitre.org","published":"1997-10-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IMAP 4.1 BETA, and possibly other versions, does not properly handle the SIGABRT (abort) signal, which allows local users to crash the server (imapd) via certain sequences of commands, which causes a core dump that may contain sensitive password information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:P","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:imapd:*:*:*:*:*:*:*:*","matchCriteriaId":"358DA403-C53C-41C5-8BA2-ECCD90A08FC4"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:imapd:4.1:*:*:*:*:*:*:*","matchCriteriaId":"F96386E6-0756-4181-9A05-1AA8AA202982"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87635124302928&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/349","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87635124302928&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/349","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0346","sourceIdentifier":"cve@mitre.org","published":"1997-10-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CGI PHP mlog script allows an attacker to read any file on the target server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php:php_fi:*:*:*:*:*:*:*:*","matchCriteriaId":"4ED621E1-B6AF-4338-9C45-AF938C6F2937"}]}]}],"references":[{"url":"http://www.osvdb.org/3397","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/713","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3397","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/713","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0192","sourceIdentifier":"cve@mitre.org","published":"1997-10-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.2:*:*:*:*:*:*:*","matchCriteriaId":"852B55FE-8180-4357-B717-399C16954C6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*","matchCriteriaId":"06F2131E-F9F2-4E65-B95C-B52DB25C69F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*","matchCriteriaId":"125918E7-53BB-407A-8D95-5D95CDF39A88"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*","matchCriteriaId":"CE0BBA4F-C61A-4A8E-A7E2-CE0DF76DF592"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.9:*:*:*:*:*:*:*","matchCriteriaId":"15CB96AA-7CC1-4F01-8E9A-F85CD851594A"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"CC3B1DD9-10B5-40FE-AE56-D068C41653DE"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0192","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0192","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0068","sourceIdentifier":"cve@mitre.org","published":"1997-10-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CGI PHP mylog script allows an attacker to read any file on the target server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*","matchCriteriaId":"92647629-083F-4042-8365-4AD2EBC9C1BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:2.0:*:*:*:*:*:*:*","matchCriteriaId":"FF72E8D5-9F8C-4BD4-9AA4-28E23CB48A47"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*","matchCriteriaId":"83BE1120-6370-4470-8586-6581EDF3FD69"}]}]}],"references":[{"url":"http://www.osvdb.org/3396","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/713","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3396","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/713","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0072","sourceIdentifier":"cve@mitre.org","published":"1997-10-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX xdat gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0072","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0072","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1131","sourceIdentifier":"cve@mitre.org","published":"1997-10-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in OSF Distributed Computing Environment (DCE) security demon (secd) in IRIX 6.4 and earlier allows attackers to cause a denial of service via a long principal, group, or organization."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980601-01-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-060.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/vendor_bulletins/VB-97.12.opengroup","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1123","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980601-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-060.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/vendor_bulletins/VB-97.12.opengroup","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1123","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1261","sourceIdentifier":"cve@mitre.org","published":"1997-10-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Rainbow Six Multiplayer allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long nickname (nick) command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:metamail_corporation:metamail:*:*:*:*:*:*:*:*","versionEndIncluding":"7.2","matchCriteriaId":"CB6F8DFB-5EA4-4572-9BCF-5D0ECD56DB6C"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12433","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1772","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12433","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1772","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0089","sourceIdentifier":"cve@mitre.org","published":"1997-10-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX libDtSvc library can allow local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0089","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0089","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0091","sourceIdentifier":"cve@mitre.org","published":"1997-10-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX writesrv command allows local users to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0091","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0091","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0092","sourceIdentifier":"cve@mitre.org","published":"1997-10-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Various vulnerabilities in the AIX portmir command allows local users to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0092","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0092","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0093","sourceIdentifier":"cve@mitre.org","published":"1997-10-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX nslookup command allows local users to obtain root access by not dropping privileges correctly."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0093","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0093","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0094","sourceIdentifier":"cve@mitre.org","published":"1997-10-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX piodmgrsu command allows local users to gain additional group privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0094","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0094","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0097","sourceIdentifier":"cve@mitre.org","published":"1997-10-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The AIX FTP client can be forced to execute commands from a malicious server through shell metacharacters (e.g. a pipe character)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*","matchCriteriaId":"E7FA635E-C0FE-495C-A2BB-D9C30A95FD00"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*","matchCriteriaId":"E178238D-E17A-48C9-8922-AC92474BDF55"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*","matchCriteriaId":"3194CFA3-F0B3-487A-99C6-1A7DF1EF0586"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*","matchCriteriaId":"035890F7-BF48-4669-812A-1DCBD91A8F34"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*","matchCriteriaId":"F9AED8F3-2501-444D-8141-37FEE2246747"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*","matchCriteriaId":"10974B0F-DA3A-4E3E-8914-8CEB366E9CC4"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*","matchCriteriaId":"C54F7F74-7DD7-431E-AE75-1D1199D63032"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0097","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0097","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0322","sourceIdentifier":"cve@mitre.org","published":"1997-10-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The open() function in FreeBSD allows local attackers to write to arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"}]}]}],"references":[{"url":"http://www.osvdb.org/6092","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6092","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0216","sourceIdentifier":"cve@mitre.org","published":"1997-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service of inetd on Linux through SYN and RST packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*","matchCriteriaId":"679EB37A-DC20-4EB0-BF1E-664BF53AC054"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0216","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0216","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0327","sourceIdentifier":"cve@mitre.org","published":"1997-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI syserr program allows local users to corrupt files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19971103-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19971103-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0328","sourceIdentifier":"cve@mitre.org","published":"1997-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI permissions program allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19971103-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19971103-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0967","sourceIdentifier":"cve@mitre.org","published":"1997-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the HTML library used by Internet Explorer, Outlook Express, and Windows Explorer via the res: local resource protocol."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:*:*:*:*:*:*:*:*","matchCriteriaId":"1FD2BCA5-9DA0-472C-B0DF-A4A8BC54B4DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_explorer:*:*:*:*:*:*:*:*","matchCriteriaId":"0802EC98-E220-46F6-84CF-7FA4E3696887"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0967","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0967","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0306","sourceIdentifier":"cve@mitre.org","published":"1997-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"buffer overflow in HP xlock program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:vvos:10.24:*:*:*:*:*:*:*","matchCriteriaId":"D9B7C178-4BE6-4397-A4E2-01375E4CA978"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0306","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0306","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0021","sourceIdentifier":"cve@mitre.org","published":"1997-11-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Arbitrary command execution via buffer overflow in Count.cgi (wwwcount) cgi-bin program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:muhammad_a._muquit:wwwcount:2.3:*:*:*:*:*:*:*","matchCriteriaId":"ECA95997-664F-4784-AE87-AAEC83432D64"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/128","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/128","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1069","sourceIdentifier":"cve@mitre.org","published":"1997-11-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in carbo.dll in iCat Carbo Server 3.0.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the icatcommand parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:icat:electronic_commerce_suite:3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"03AFE70C-EB1A-4141-86C5-70021174DE74"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/7943","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/2126","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1620","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/7943","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/2126","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1620","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1424","sourceIdentifier":"cve@mitre.org","published":"1997-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris Solstice AdminSuite (AdminSuite) 2.1 uses unsafe permissions when adding new users to the NIS+ password table, which allows local users to gain root access by modifying their password table entries."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:*:*:*:*:*:*","matchCriteriaId":"69DB4DAD-6F73-409B-8D9D-F8B04C39DAA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:x86:*:*:*:*:*","matchCriteriaId":"9FF7DF93-A041-46E7-88A3-4AA875BDEF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:*:*:*:*:*:*","matchCriteriaId":"5A176015-C664-41FC-A1DF-785E7A65C482"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:x86:*:*:*:*:*","matchCriteriaId":"1E5706BE-3F22-4DDC-BDA5-17DE023F2A13"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1425","sourceIdentifier":"cve@mitre.org","published":"1997-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris Solstice AdminSuite (AdminSuite) 2.1 incorrectly sets write permissions on source files for NIS maps, which could allow local users to gain privileges by modifying /etc/passwd."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:*:*:*:*:*:*","matchCriteriaId":"69DB4DAD-6F73-409B-8D9D-F8B04C39DAA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:x86:*:*:*:*:*","matchCriteriaId":"9FF7DF93-A041-46E7-88A3-4AA875BDEF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:*:*:*:*:*:*","matchCriteriaId":"5A176015-C664-41FC-A1DF-785E7A65C482"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:x86:*:*:*:*:*","matchCriteriaId":"1E5706BE-3F22-4DDC-BDA5-17DE023F2A13"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1426","sourceIdentifier":"cve@mitre.org","published":"1997-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris Solstice AdminSuite (AdminSuite) 2.1 follows symbolic links when updating an NIS database, which allows local users to overwrite arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:*:*:*:*:*:*","matchCriteriaId":"69DB4DAD-6F73-409B-8D9D-F8B04C39DAA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:x86:*:*:*:*:*","matchCriteriaId":"9FF7DF93-A041-46E7-88A3-4AA875BDEF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:*:*:*:*:*:*","matchCriteriaId":"5A176015-C664-41FC-A1DF-785E7A65C482"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:x86:*:*:*:*:*","matchCriteriaId":"1E5706BE-3F22-4DDC-BDA5-17DE023F2A13"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1427","sourceIdentifier":"cve@mitre.org","published":"1997-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris Solstice AdminSuite (AdminSuite) 2.1 and 2.2 create lock files insecurely, which allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:*:*:*:*:*:*","matchCriteriaId":"69DB4DAD-6F73-409B-8D9D-F8B04C39DAA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:x86:*:*:*:*:*","matchCriteriaId":"9FF7DF93-A041-46E7-88A3-4AA875BDEF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:*:*:*:*:*:*","matchCriteriaId":"5A176015-C664-41FC-A1DF-785E7A65C482"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:x86:*:*:*:*:*","matchCriteriaId":"1E5706BE-3F22-4DDC-BDA5-17DE023F2A13"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1428","sourceIdentifier":"cve@mitre.org","published":"1997-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris Solstice AdminSuite (AdminSuite) 2.1 and 2.2 allows local users to gain privileges via the save option in the Database Manager, which is running with setgid bin privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:*:*:*:*:*:*","matchCriteriaId":"69DB4DAD-6F73-409B-8D9D-F8B04C39DAA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.1:*:x86:*:*:*:*:*","matchCriteriaId":"9FF7DF93-A041-46E7-88A3-4AA875BDEF4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:*:*:*:*:*:*","matchCriteriaId":"5A176015-C664-41FC-A1DF-785E7A65C482"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_adminsuite:2.2:*:x86:*:*:*:*:*","matchCriteriaId":"1E5706BE-3F22-4DDC-BDA5-17DE023F2A13"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/145","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/208","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1210","sourceIdentifier":"cve@mitre.org","published":"1997-11-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"xterm in Digital UNIX 4.0B *with* patch kit 5 allows local users to overwrite arbitrary files via a symlink attack on a core dump file, which is created when xterm is called with a DISPLAY environmental variable set to a display that xterm cannot access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*","matchCriteriaId":"07476CFD-859F-4AD7-8514-130E7A86BAE5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87936891504885&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/613","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87936891504885&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/613","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1209","sourceIdentifier":"cve@mitre.org","published":"1997-11-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7363FF35-7C67-40DC-AD38-74FD6264BF5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88131151000069&w=2","source":"cve@mitre.org"},{"url":"http://www.cert.org/vendor_bulletins/VB-97.14.scoterm","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/690","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88131151000069&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/vendor_bulletins/VB-97.14.scoterm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/690","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0210","sourceIdentifier":"cve@mitre.org","published":"1997-11-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Automount daemon automountd allows local or remote users to gain privileges via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88053459921223&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91547759121289&w=2","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-99-05-statd-automountd.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/235","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9910-104","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88053459921223&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91547759121289&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-99-05-statd-automountd.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/235","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9910-104","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1257","sourceIdentifier":"cve@mitre.org","published":"1997-11-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Xyplex terminal server 6.0.1S1, and possibly other versions, allows remote attackers to bypass the password prompt by entering (1) a CTRL-Z character, or (2) a ? (question mark)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:xyplex:maxserver_xyplex_terminal_server:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0.2_s4","matchCriteriaId":"4EE7BCE3-4780-4EDF-9C30-EF1956CA1E6B"},{"vulnerable":true,"criteria":"cpe:2.3:h:xyplex:maxserver_xyplex_terminal_server:6.0.1_s1:*:*:*:*:*:*:*","matchCriteriaId":"DD6035F1-1E42-4905-94F7-6D2762223168"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8134","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1825","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1826","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/8134","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1825","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1826","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0016","sourceIdentifier":"cve@mitre.org","published":"1997-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Land IP denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:7000:*:*:*:*:*:*:*","matchCriteriaId":"008881AE-153D-4691-9500-900071302ECD"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*","matchCriteriaId":"679EB37A-DC20-4EB0-BF1E-664BF53AC054"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:winsock:2.0:*:*:*:*:*:*:*","matchCriteriaId":"BA2F784E-2B6A-4BF7-9A16-77031AFD6272"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*","matchCriteriaId":"E7FA635E-C0FE-495C-A2BB-D9C30A95FD00"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*","matchCriteriaId":"E178238D-E17A-48C9-8922-AC92474BDF55"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*","matchCriteriaId":"035890F7-BF48-4669-812A-1DCBD91A8F34"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-076","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-076","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://security.netapp.com/advisory/ntap-20170815-0001/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0193","sourceIdentifier":"cve@mitre.org","published":"1997-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Ascend and 3com routers, which can be rebooted by sending a zero length TCP option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ascend:cascadeview_ux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"FBDA4DDC-9DA4-4815-835A-8FFB293AABD2"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0193","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0193","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0244","sourceIdentifier":"cve@mitre.org","published":"1997-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Livingston RADIUS code has a buffer overflow which can allow remote execution of commands as root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:livingston:radius:1.x:*:*:*:*:*:*:*","matchCriteriaId":"8DA8184B-7BA4-4D71-BA0F-AC50C21E4BAC"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0244","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0244","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0340","sourceIdentifier":"cve@mitre.org","published":"1997-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Linux Slackware crond program allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0340","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0340","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0018","sourceIdentifier":"cve@mitre.org","published":"1997-12-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in statd allows root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/127","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://www.securityfocus.com/bid/127","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]}]}},{"cve":{"id":"CVE-1999-0017","sourceIdentifier":"cve@mitre.org","published":"1997-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*","matchCriteriaId":"679EB37A-DC20-4EB0-BF1E-664BF53AC054"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:inet:6.01:*:*:*:*:*:*:*","matchCriteriaId":"4AF8F484-F5AA-4834-B976-764B2488F377"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:inet:6.02:*:*:*:*:*:*:*","matchCriteriaId":"C692D0C5-BCF4-4C68-B7DF-EDCE4A55F1B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"A86BB4F6-210F-448A-A3CB-127BEB5BD0D2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"A5C77FA7-C977-4223-B6AC-91B82C45129C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"44EFD22E-02C9-4B80-8934-A9AC8DD858CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"B1B4D4A5-25EB-48FE-BDFD-A274CE802648"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"F3A037F1-98AD-47CC-8D83-B42666E1B61E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*","matchCriteriaId":"CF4F7002-A525-4A66-BE8B-E50ABBF144B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"55DD3C82-0B7D-4B25-B603-AD6C6D59239A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"035FBF8B-EB91-4211-9979-8A9E913A54A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:siemens:reliant_unix:*:*:*:*:*:*:*:*","matchCriteriaId":"8A2C5456-FF11-403E-B67E-5961278D812A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*","matchCriteriaId":"D1DEB967-BD3E-4CCF-B53F-3927454FA689"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*","matchCriteriaId":"1C89DF53-2038-487A-A08F-8D705B7BFB27"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"C82E90A7-C5D7-4DFC-8FF5-4EFAF30C790B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0017","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1140","sourceIdentifier":"cve@mitre.org","published":"1997-12-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CrackLib 2.5 may allow local users to gain root privileges via a long GECOS field."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:alec_muffet:cracklib:2.5:*:*:*:*:*:*:*","matchCriteriaId":"235DD283-3E6E-4124-A80A-9CBD84DA8943"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88209041500913&w=2","source":"cve@mitre.org"},{"url":"http://www.cert.org/vendor_bulletins/VB-97.16.CrackLib","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1539","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88209041500913&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/vendor_bulletins/VB-97.16.CrackLib","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1539","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0230","sourceIdentifier":"cve@mitre.org","published":"1997-12-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Cisco 7xx routers through the telnet service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*","matchCriteriaId":"96C6FB91-22FC-4DA9-B19A-8065D8B89F03"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"06CF972E-A755-4FB7-BFD7-9F4CDDEA4F1C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"9B4FC3E9-E88E-4C87-ADA4-AC9370BBFD32"}]}]}],"references":[{"url":"http://www.osvdb.org/1102","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1102","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0004","sourceIdentifier":"cve@mitre.org","published":"1997-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MIME buffer overflow in email clients, e.g. Solaris mailtool and Outlook."},{"lang":"es","value":"Desbordamiento de buffer en clientes de correo, como Solaris mailtool y Outlook"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:dtmail:*:*:*:*:*:*:*:*","matchCriteriaId":"C5AE373B-03E5-4F85-A316-18F68DF79331"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:4.02:*:*:*:*:*:*:*","matchCriteriaId":"4473251D-4DB0-43E5-90C6-32FEB8B5A4A2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-008","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-008","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0015","sourceIdentifier":"cve@mitre.org","published":"1997-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Teardrop IP denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*","matchCriteriaId":"E7FA635E-C0FE-495C-A2BB-D9C30A95FD00"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*","matchCriteriaId":"E178238D-E17A-48C9-8922-AC92474BDF55"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*","matchCriteriaId":"035890F7-BF48-4669-812A-1DCBD91A8F34"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:0.0a:*:*:*:*:*:*:*","matchCriteriaId":"5190BE3F-DA55-4463-A19C-904BF848D5DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D0D4EAC2-A948-461F-B5DD-0AE73CF05D29"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp1:*:*:*:*:*:*","matchCriteriaId":"EF8BECF6-3C33-4D8C-B54E-A0D2F3295E81"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp2:*:*:*:*:*:*","matchCriteriaId":"828B4519-24D8-45A7-8448-D5FF6C83A2C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"55DD3C82-0B7D-4B25-B603-AD6C6D59239A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]}]}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5579","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5579","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0104","sourceIdentifier":"cve@mitre.org","published":"1997-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"0C724A3D-F6E5-4E0B-8201-ACC87CB9C94D"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:0a:*:*:*:*:*:*:*","matchCriteriaId":"8429C080-F550-4D03-A87A-4546273712AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/80175","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5743","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/80175","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5743","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1581","sourceIdentifier":"cve@mitre.org","published":"1997-12-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Memory leak in Simple Network Management Protocol (SNMP) agent (snmp.exe) for Windows NT 4.0 before Service Pack 4 allows remote attackers to cause a denial of service (memory consumption) via a large number of SNMP packets with Object Identifiers (OIDs) that cannot be decoded."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"}]}]}],"references":[{"url":"http://support.microsoft.com/kb/q178381/","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/4923","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8231","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/kb/q178381/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/4923","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8231","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1230","sourceIdentifier":"cve@mitre.org","published":"1997-12-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Quake 2 server allows remote attackers to cause a denial of service via a spoofed UDP packet with a source address of 127.0.0.1, which causes the server to attempt to connect to itself."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:id_software:quake_2:*:*:*:*:*:*:*:*","matchCriteriaId":"4D1FCAF1-2BF0-4CA4-B107-832063EE0F9C"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8282","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/698","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/8282","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/698","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1274","sourceIdentifier":"cve@mitre.org","published":"1997-12-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"iPass RoamServer 3.1 creates temporary files with world-writable permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipass:roamserver:3.1:*:*:*:*:*:*:*","matchCriteriaId":"7343911B-BDBB-4F46-8B1C-BE71DAD30CE1"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8307","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1625","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/8307","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1625","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0107","sourceIdentifier":"cve@mitre.org","published":"1997-12-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*","matchCriteriaId":"E80E240C-9879-48EC-AC9A-2C1FD5E2DD8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*","matchCriteriaId":"AF16AF7D-9475-435F-AE36-F16CE8F45A75"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"06F3141B-2C30-4230-A425-465E235539EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"B6D2C9EA-1241-4DE6-A6CD-FCD7EEC9B42D"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"B5EA86B9-4F86-4ADA-BC6A-4F6E261848F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"CA6523AC-ECC9-4A79-9387-18308FCF9A68"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*","matchCriteriaId":"BDCBCF0F-63FB-4A03-92F8-FF121083CD85"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"4363C07C-179B-4797-947F-7440AD1F2D00"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*","matchCriteriaId":"AB26F3B0-04F8-43C1-9136-B85932F1C2F1"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0107","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0107","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0114","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local users can execute commands as other users, and read other users' files, through the filter command in the Elm elm-2.4 mail package using a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elm_development_group:elm:2.4:*:*:*:*:*:*:*","matchCriteriaId":"5265C254-5FB6-4238-BD28-4176C70A29F4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0114","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0114","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0239","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape FastTrack Web server lists files when a lowercase \"get\" command is used instead of an uppercase GET."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-178"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:fasttrack_server:3.01:*:*:*:*:*:*:*","matchCriteriaId":"63A12C94-E68C-48E2-B88E-571C4FD9099C"}]}]}],"references":[{"url":"http://www.osvdb.org/122","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1731","source":"nvd@nist.gov","tags":["Third Party Advisory"]},{"url":"http://www.osvdb.org/122","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}},{"cve":{"id":"CVE-1999-0273","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service through Solaris 2.5.1 telnet by sending ^D characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0273","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0273","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0279","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Excite for Web Servers (EWS) allows remote command execution via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:excite:ews:1.1:*:*:*:*:*:*:*","matchCriteriaId":"5F69DC10-474D-44C8-BE36-7F77EFBB0955"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0279","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0279","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0284","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service to NT mail servers including Ipswitch, Mdaemon, and Exchange through a buffer overflow in the SMTP HELO command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_domino_mail_server:*:*:*:*:*:*:*:*","matchCriteriaId":"42E18F8C-4D45-4404-9DC0-8DDF24E18282"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:4.0:-:*:*:*:*:*:*","matchCriteriaId":"1122C21D-C67C-4702-A084-A0DFBA03A761"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.0:-:*:*:*:*:*:*","matchCriteriaId":"D823C88E-8560-469B-8655-4755E0484F14"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0284","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0284","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0293","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AAA authentication on Cisco systems allows attackers to execute commands without authorization."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*","matchCriteriaId":"B6230A85-30D2-4934-A8A0-11499B7B09F8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0293","source":"cve@mitre.org","tags":["VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0293","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0331","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Internet Explorer 4.0(1)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"943D5C5C-FC49-4EDE-AE75-A79CFF42208E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0331","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0331","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0341","sourceIdentifier":"cve@mitre.org","published":"1998-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the Linux mail program \"deliver\" allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"7A632089-47D7-410D-AE12-F801193FA18F"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"F3698FC7-C9A6-4AA5-8569-CF96128A63AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"A5A8D289-2310-4583-95F0-0CB940B6CBF1"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:2.3:*:*:*:*:*:*:*","matchCriteriaId":"6325268D-C355-4DD3-A839-6C3CF5435B0C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0341","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0341","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1439","sourceIdentifier":"cve@mitre.org","published":"1998-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"gcc 2.7.2 allows local users to overwrite arbitrary files via a symlink attack on temporary .i, .s, or .o files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gcc:gcc:2.7.2:*:*:*:*:*:*:*","matchCriteriaId":"7AAD2943-904B-4AF9-A9CD-2D5C4A47DE21"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88419592307388&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88492937727193&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88524071002939&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/146","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88419592307388&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=88492937727193&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=88524071002939&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/146","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0513","sourceIdentifier":"cve@mitre.org","published":"1998-01-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ICMP messages to broadcast addresses are allowed, allowing for a Smurf attack that can cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:3.2g:*:*:*:*:*:*:*","matchCriteriaId":"BD4B2280-5114-4CBD-9B06-221BD9CE4229"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E1E08495-C0C5-40A9-A8FF-834F5F6083B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*","matchCriteriaId":"781D13E2-35BB-4D58-A68F-86401D08D438"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*","matchCriteriaId":"07476CFD-859F-4AD7-8514-130E7A86BAE5"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0c:*:*:*:*:*:*:*","matchCriteriaId":"A5F097D7-CD52-44FC-851C-7DB42E57DCB8"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*","matchCriteriaId":"8C250283-4343-4569-A6EA-988FB7319AA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","matchCriteriaId":"BF8F9B2F-E898-4F87-A245-32A41748587B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*","matchCriteriaId":"96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5E4A2912-12AC-4DF1-8023-A0B7DBE9A866"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"55DD3C82-0B7D-4B25-B603-AD6C6D59239A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0513","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0513","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1429","sourceIdentifier":"cve@mitre.org","published":"1998-01-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DIT TransferPro installs devices with world-readable and world-writable permissions, which could allow local users to damage disks through the ff device driver."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dit:transferpro:*:*:*:*:*:*:*:*","matchCriteriaId":"7BE48640-4059-4437-B36E-958C710E6308"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88419633507543&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/204","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88419633507543&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/204","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0086","sourceIdentifier":"cve@mitre.org","published":"1998-01-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX routed allows remote users to modify sensitive files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0086","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0086","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1176","sourceIdentifier":"cve@mitre.org","published":"1998-01-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in cidentd ident daemon allows local users to gain root privileges via a long line in the .authlie script."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aaron_ledbetter:cidentd:*:*:*:*:*:*:*:*","matchCriteriaId":"B72C8BB6-861A-47E1-8D4F-8A2521C0792B"},{"vulnerable":true,"criteria":"cpe:2.3:a:jidentd:jidentd:*:*:*:*:*:*:*:*","matchCriteriaId":"FE57F796-4FA3-417D-AA26-3C951728D61A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88466930416716&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90554230925545&w=2","source":"cve@mitre.org"},{"url":"http://spisa.act.uji.es/spi/progs/codigo/www.hack.co.za/exploits/daemon/ident/cidentd.c","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88466930416716&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90554230925545&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://spisa.act.uji.es/spi/progs/codigo/www.hack.co.za/exploits/daemon/ident/cidentd.c","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0958","sourceIdentifier":"cve@mitre.org","published":"1998-01-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"sudo 1.5.x allows local users to execute arbitrary commands via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:todd_miller:sudo:1.5:*:*:*:*:*:*:*","matchCriteriaId":"9D796959-61D2-42D5-BF93-1A93AE1392BC"},{"vulnerable":true,"criteria":"cpe:2.3:a:todd_miller:sudo:1.5.2:*:*:*:*:*:*:*","matchCriteriaId":"61D6855B-2B49-4695-9C8F-38CBE95E115A"},{"vulnerable":true,"criteria":"cpe:2.3:a:todd_miller:sudo:1.5.3:*:*:*:*:*:*:*","matchCriteriaId":"E8D768E6-6B55-448E-B6B6-58391971CA86"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88465708614896&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88465708614896&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0271","sourceIdentifier":"cve@mitre.org","published":"1998-01-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Progressive Networks Real Video server (pnserver) can be crashed remotely."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0271","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0271","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1045","sourceIdentifier":"cve@mitre.org","published":"1998-01-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"pnserver in RealServer 5.0 and earlier allows remote attackers to cause a denial of service by sending a short, malformed request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"BE671A54-2E76-467E-8945-10982B79F4CE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88490880523890&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88492978527261&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90338245305236&w=2","source":"cve@mitre.org"},{"url":"http://service.real.com/help/faq/serv501.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.iss.net/security_center/static/7297.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6979","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88490880523890&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=88492978527261&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90338245305236&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://service.real.com/help/faq/serv501.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.iss.net/security_center/static/7297.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6979","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0014","sourceIdentifier":"cve@mitre.org","published":"1998-01-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unauthorized privileged access or denial of service via dtappgather program in CDE."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.01:*:*:*:*:*:*:*","matchCriteriaId":"F2611013-0EF4-4FDD-AB86-DAB93D50528D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.01_x86:*:*:*:*:*:*:*","matchCriteriaId":"87B56680-D05B-49BB-8962-2DDD84DF9824"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.02:*:*:*:*:*:*:*","matchCriteriaId":"05D7A888-6739-4D80-9807-E2AA983DAEDA"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.2:*:*:*:*:*:*:*","matchCriteriaId":"0409D8C4-A512-492A-9093-CE1E78E1426E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.02_x86:*:*:*:*:*:*:*","matchCriteriaId":"25543AC5-A778-4EF6-8ACD-3841268EADBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.2_x86:*:*:*:*:*:*:*","matchCriteriaId":"38748ACD-16B2-40A5-8E5A-681B2F2DF8BC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:vvos:10.24:*:*:*:*:*:*:*","matchCriteriaId":"D9B7C178-4BE6-4397-A4E2-01375E4CA978"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/185","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-075","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/185","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9801-075","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1487","sourceIdentifier":"cve@mitre.org","published":"1998-01-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in digest in AIX 4.3 allows printq users to gain root privileges by creating and/or modifing any file on the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://www-1.ibm.com/servlet/support/manager?rt=0&rs=0&org=apars&doc=41D8B61D1E1C4FAB852567C9002C546C","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7477.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/405","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www-1.ibm.com/servlet/support/manager?rt=0&rs=0&org=apars&doc=41D8B61D1E1C4FAB852567C9002C546C","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7477.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/405","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0013","sourceIdentifier":"cve@mitre.org","published":"1998-01-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-522"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"1E9C3330-E163-4699-B7F6-2D9B089E8A6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"011ECCA8-63DD-4FB0-A2F4-B4BAF344242E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*","matchCriteriaId":"86A52DB0-B17A-437C-8E3A-0F824B9F88AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*","matchCriteriaId":"6A9E54C6-7003-46B0-85B3-0C2E7E611D38"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*","matchCriteriaId":"082C8ECC-CDAF-440B-90D0-A1FE028B03F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*","matchCriteriaId":"7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*","matchCriteriaId":"C0C2A220-D8AB-4FAD-8048-F2C1764F965F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*","matchCriteriaId":"5010A78A-394E-4196-90CB-5D371C3BD1EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*","matchCriteriaId":"E5F6F181-41B1-47D1-A216-194DC4C762EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*","matchCriteriaId":"D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*","matchCriteriaId":"45446BD9-3B03-43B6-B686-F6EACFABD699"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*","matchCriteriaId":"FCE6F492-8E28-4FA1-9BF1-96BAF5D68545"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*","matchCriteriaId":"41BF66ED-CB08-440E-AC05-A31371B7A380"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0013","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0125","sourceIdentifier":"cve@mitre.org","published":"1998-01-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SGI IRIX mailx program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980605-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980605-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0264","sourceIdentifier":"cve@mitre.org","published":"1998-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"htmlscript CGI program allows remote read access to files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:miva:htmlscript:*:*:*:*:*:*:*:*","matchCriteriaId":"9DA9DC24-2F62-4BD1-BD41-FAFEDD6761B9"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0264","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0264","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0087","sourceIdentifier":"cve@mitre.org","published":"1998-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in AIX telnet can freeze a system and prevent users from accessing the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://www.osvdb.org/7992","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7992","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0256","sourceIdentifier":"cve@mitre.org","published":"1998-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in War FTP allows remote execution of commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jgaa:warftpd:*:*:*:*:*:*:*:*","versionEndIncluding":"1.66","matchCriteriaId":"423A7921-1AD4-48F3-9049-0E9772CF6EA6"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://www.osvdb.org/875","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/875","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0296","sourceIdentifier":"cve@mitre.org","published":"1998-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris volrmmount program allows attackers to read any file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/162","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/162","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0304","sourceIdentifier":"cve@mitre.org","published":"1998-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"mmap function in BSD allows local attackers in the kmem group to modify memory through devices."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","matchCriteriaId":"99235B00-0050-42BF-99EF-FCDD72D8627D"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"1FC373FC-88AC-4B6D-A289-51881ACD57F7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0304","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0304","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0305","sourceIdentifier":"cve@mitre.org","published":"1998-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The system configuration control (sysctl) facility in BSD based operating systems OpenBSD 2.2 and earlier, and FreeBSD 2.2.5 and earlier, does not properly restrict source routed packets even when the (1) dosourceroute or (2) forwarding variables are set, which allows remote attackers to spoof TCP connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7932DF-A035-4506-9BF1-C733DC5DD872"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","matchCriteriaId":"314BA420-4C74-4060-8ACE-D7A7C041CF2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"36DF0D51-FCFA-46A3-B834-E80DFA91DFDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5CB726CF-ADA2-4CDA-9786-1E84AC53740A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"1FC373FC-88AC-4B6D-A289-51881ACD57F7"}]}]}],"references":[{"url":"http://www.openbsd.org/advisories/sourceroute.txt","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/11502","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/736","source":"cve@mitre.org"},{"url":"http://www.openbsd.org/advisories/sourceroute.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/11502","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/736","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0486","sourceIdentifier":"cve@mitre.org","published":"1998-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in AOL Instant Messenger when a remote attacker sends a malicious hyperlink to the receiving client, potentially causing a system crash."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:3.5:*:*:*:*:*:*:*","matchCriteriaId":"4AECAE9C-64B4-4BE9-AC7B-10108C8AA42C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0486","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0486","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1445","sourceIdentifier":"cve@mitre.org","published":"1998-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in imapd and ipop3d in Slackware 3.4 and 3.3 with shadowing enabled, and possibly other operating systems, allows remote attackers to cause a core dump via a short sequence of USER and PASS commands that do not provide valid usernames or passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*","matchCriteriaId":"06F2131E-F9F2-4E65-B95C-B52DB25C69F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88637951600184&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88637951600184&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0012","sourceIdentifier":"cve@mitre.org","published":"1998-02-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:L","baseScore":7.0,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":2.2,"impactScore":4.7}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-290"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*","matchCriteriaId":"0951E183-2BFE-4B19-9F06-107B5E22DBC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:personal_web_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"9E075F89-BC5D-48D8-8CA1-B56C2CAD50F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7A7B9FDA-DC62-4EC9-9120-A7E6795C2815"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:fasttrack_server:2.01:*:*:*:*:*:*:*","matchCriteriaId":"4F156CEA-E3F2-4F2E-8065-FC606DD58F87"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:fasttrack_server:3.01:*:*:*:*:*:*:*","matchCriteriaId":"63A12C94-E68C-48E2-B88E-571C4FD9099C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0012","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0012","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1269","sourceIdentifier":"cve@mitre.org","published":"1998-02-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Screen savers in KDE beta 3 allows local users to overwrite arbitrary files via a symlink attack on the .kss.pid file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde_beta_3:initial:*:*:*:*:*:*:*","matchCriteriaId":"91208CE7-A5D0-4003-85CF-1D6C31DA378C"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8506","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1641","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/8506","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1641","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0258","sourceIdentifier":"cve@mitre.org","published":"1998-02-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Bonk variation of teardrop IP fragmentation denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://marc.info/?l=ntbugtraq&m=88901842000424&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=ntbugtraq&m=88901842000424&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0225","sourceIdentifier":"cve@mitre.org","published":"1998-02-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 allows remote attackers to cause a denial of service via a malformed SMB logon request in which the actual data size does not match the specified size."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=180963","source":"cve@mitre.org"},{"url":"http://www.nai.com/nai_labs/asp_set/advisory/25_windows_nt_dos_adv.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=180963","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.nai.com/nai_labs/asp_set/advisory/25_windows_nt_dos_adv.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1207","sourceIdentifier":"cve@mitre.org","published":"1998-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in web-admin tool in NetXRay 2.6 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_general:netxray:all_versions:*:*:*:*:*:*:*","matchCriteriaId":"A266DB19-6CA5-41AC-88BD-91CD83C1FD1F"}]}]}],"references":[{"url":"http://www.efri.hr/~crv/security/bugs/NT/netxtray.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/907","source":"cve@mitre.org"},{"url":"http://www.efri.hr/~crv/security/bugs/NT/netxtray.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/907","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0323","sourceIdentifier":"cve@mitre.org","published":"1998-02-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD mmap function allows users to modify append-only or immutable files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","matchCriteriaId":"99235B00-0050-42BF-99EF-FCDD72D8627D"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"1FC373FC-88AC-4B6D-A289-51881ACD57F7"}]}]}],"references":[{"url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1998-003.txt.asc","source":"cve@mitre.org"},{"url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1998-003.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1273","sourceIdentifier":"cve@mitre.org","published":"1998-02-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Squid Internet Object Cache 1.1.20 allows users to bypass access control lists (ACLs) by encoding the URL with hexadecimal escape sequences."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:national_science_foundation:squid_web_proxy:1.1.20:*:*:*:*:*:*:*","matchCriteriaId":"C92A4975-559A-4789-AFE9-495A9AE595D3"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8551","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1627","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/8551","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1627","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0290","sourceIdentifier":"cve@mitre.org","published":"1998-02-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WinGate telnet proxy allows remote attackers to cause a denial of service via a large number of connections to localhost."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qbik:wingate:*:*:*:*:*:*:*:*","matchCriteriaId":"E13C7802-12EA-41D8-B145-43621072999A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0290","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0290","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1229","sourceIdentifier":"cve@mitre.org","published":"1998-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Quake 2 server 3.13 on Linux does not properly check file permissions for the config.cfg configuration file, which allows local users to read arbitrary files via a symlink from config.cfg to the target file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:id_software:quake_2_server:*:*:*:*:*:*:*:*","versionEndIncluding":"3.13","matchCriteriaId":"1277274B-03EE-4EE5-BF59-794337493F4A"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8590","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/733","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/8590","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/733","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1486","sourceIdentifier":"cve@mitre.org","published":"1998-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"sadc in IBM AIX 4.1 through 4.3, when called from programs such as timex that are setgid adm, allows local users to overwrite arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:N/I:P/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://techsupport.services.ibm.com/aix/fixes/v4/os/bos.acct.4.3.1.0.info","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX75554&apar=only","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX76330&apar=only","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX76853&apar=only","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/408","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7675","source":"cve@mitre.org"},{"url":"http://techsupport.services.ibm.com/aix/fixes/v4/os/bos.acct.4.3.1.0.info","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX75554&apar=only","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX76330&apar=only","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX76853&apar=only","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/408","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7675","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0266","sourceIdentifier":"cve@mitre.org","published":"1998-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The info2www CGI script allows remote file access or remote command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:roar_smith:info2www:*:*:*:*:*:*:*:*","matchCriteriaId":"B5D125BC-22FE-404F-8F43-41882672ECD9"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1995","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1995","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0320","sourceIdentifier":"cve@mitre.org","published":"1998-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SunOS rpc.cmsd allows attackers to obtain root access by overwriting arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/166","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/166","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0330","sourceIdentifier":"cve@mitre.org","published":"1998-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux bdash game has a buffer overflow that allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=87602558319119&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=87602558319119&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0502","sourceIdentifier":"cve@mitre.org","published":"1998-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Unix account has a default, null, blank, or missing password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*","matchCriteriaId":"87FB80D8-1BE7-46F7-9F7E-B7DA88D039F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","matchCriteriaId":"A2475113-CFE4-41C8-A86F-F2DA6548D224"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0502","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0502","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0514","sourceIdentifier":"cve@mitre.org","published":"1998-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UDP messages to broadcast addresses are allowed, allowing for a Fraggle attack that can cause a denial of service by flooding the target."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0514","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0514","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0795","sourceIdentifier":"cve@mitre.org","published":"1998-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*","matchCriteriaId":"469B74F2-4B89-42B8-8638-731E92D463B9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0795","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0795","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1272","sourceIdentifier":"cve@mitre.org","published":"1998-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in CDROM Confidence Test program (cdrom) allow local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1635","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1635","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1407","sourceIdentifier":"cve@mitre.org","published":"1998-03-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ifdhcpc-done script for configuring DHCP on Red Hat Linux 5 allows local users to append text to arbitrary files via a symlink attack on the dhcplog file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88950856416985&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7294.php","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#initscripts","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/368","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88950856416985&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7294.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#initscripts","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/368","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1118","sourceIdentifier":"cve@mitre.org","published":"1998-03-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ndd in Solaris 2.6 allows local users to cause a denial of service by modifying certain TCP/IP parameters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/165&type=0&nav=sec.sba","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/433","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/817","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/165&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/433","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/817","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0060","sourceIdentifier":"cve@mitre.org","published":"1998-03-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_max_router:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0DD46C3E-83EE-4DD4-A925-59A6F839EE6C"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_max_router:2.0:*:*:*:*:*:*:*","matchCriteriaId":"98D08C67-F634-41DB-AB33-B029A4AB9417"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_max_router:3.0:*:*:*:*:*:*:*","matchCriteriaId":"3C90F2EE-AE20-4D17-9DC9-01C84BBE7696"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_max_router:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E1A06F55-2174-4825-A348-A6D65F94C7A0"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_max_router:5.0:*:*:*:*:*:*:*","matchCriteriaId":"627B08BB-DC4E-49F3-AE22-CD50906FB337"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_pipeline_router:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0A2DCBCB-4B58-4463-B8D5-DABC654AD524"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_pipeline_router:2.0:*:*:*:*:*:*:*","matchCriteriaId":"703FD9A7-8E68-4DC8-B4C6-346BDED1FEA7"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_pipeline_router:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D064ECCA-FFBA-4932-9803-5F939B9451ED"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_pipeline_router:4.0:*:*:*:*:*:*:*","matchCriteriaId":"8FF57770-EC66-4E2B-8A8C-817854BCBBB4"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_pipeline_router:5.0:*:*:*:*:*:*:*","matchCriteriaId":"3583D347-AED3-4469-8D36-1C873A7E4459"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_pipeline_router:6.0:*:*:*:*:*:*:*","matchCriteriaId":"D182FD25-327B-4B7C-89B3-5A91053C5666"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_tnt_router:1.0:*:*:*:*:*:*:*","matchCriteriaId":"E5ADBC4C-9CA8-4EEC-A91C-628A5C636282"},{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_tnt_router:2.0:*:*:*:*:*:*:*","matchCriteriaId":"75AB8E35-0610-4363-94B1-81C4F08C85C1"}]}]}],"references":[{"url":"http://www.ascend.com/2695.html","source":"cve@mitre.org"},{"url":"http://www.ascend.com/2695.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1075","sourceIdentifier":"cve@mitre.org","published":"1998-03-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"inetd in AIX 4.1.5 dynamically assigns a port N when starting ttdbserver (ToolTalk server), but also inadvertently listens on port N-1 without passing control to ttdbserver, which allows remote attackers to cause a denial of service via a large number of connections to port N-1, which are not properly closed by inetd."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=89025820612530&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=89025820612530&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0960","sourceIdentifier":"cve@mitre.org","published":"1998-03-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IRIX cdplayer allows local users to create directories in arbitrary locations via a command line option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980301-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0003","sourceIdentifier":"cve@mitre.org","published":"1998-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tritreal:ted_cde:4.3:*:*:*:*:*:*:*","matchCriteriaId":"7E202DA5-C921-44E5-9581-26746AF580CE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.02:*:*:*:*:*:*:*","matchCriteriaId":"880DDA5D-0B8E-42E7-A346-5F594DC05332"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.03:*:*:*:*:*:*:*","matchCriteriaId":"CC7983C3-4F53-4A80-AAFC-EFF75B7D7BD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/122","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981101-01-A","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981101-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/122","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0098","sourceIdentifier":"cve@mitre.org","published":"1998-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:appleshare:-:*:*:ja:*:*:*:*","matchCriteriaId":"AB3E4751-4BC6-427E-BA98-6CD414D38AE1"},{"vulnerable":true,"criteria":"cpe:2.3:a:pmail:mercury_mail_server:-:*:*:*:*:*:*:*","matchCriteriaId":"DF801926-9C57-4BB9-A55A-FC35E86623B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:seattlelab:slmail:2.6:*:*:*:*:*:*:*","matchCriteriaId":"65AE12AD-FD84-47F2-B8DB-B147EBC0C94B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0098","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0098","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0257","sourceIdentifier":"cve@mitre.org","published":"1998-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nestea variation of teardrop IP fragmentation denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0257","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0257","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0507","sourceIdentifier":"cve@mitre.org","published":"1998-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An account on a router, firewall, or other network device has a guessable password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0507","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0507","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0537","sourceIdentifier":"cve@mitre.org","published":"1998-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A configuration in a web browser such as Internet Explorer or Netscape Navigator allows execution of active content such as ActiveX, Java, Javascript, etc."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*","matchCriteriaId":"7B90EA4B-DA10-44B7-BD3D-6AE1197212D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:*:*:*:*:*:*:*:*","matchCriteriaId":"66BDCBFA-2C8E-4D6B-B63F-79C23CC19488"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0537","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0537","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0551","sourceIdentifier":"cve@mitre.org","published":"1998-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP OpenMail can be misconfigured to allow users to run arbitrary commands using malicious print requests."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openmail:4.1:*:*:*:*:*:*:*","matchCriteriaId":"46052D06-A390-41DF-89BA-10A7FAC97F5B"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openmail:5.1:*:*:*:*:*:*:*","matchCriteriaId":"F2439ABC-5FEE-466E-A952-18EBFAC15000"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openmail:5.10:*:*:*:*:*:*:*","matchCriteriaId":"E9321A32-BC5E-4972-873A-FDB1F5779149"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9804-078","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9804-078","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1183","sourceIdentifier":"cve@mitre.org","published":"1998-04-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"System Manager sysmgr GUI in SGI IRIX 6.4 and 6.3 allows remote attackers to execute commands by providing a trojan horse (1) runtask or (2) runexec descriptor file, which is used to execute a System Manager Task when the user's Mailcap entry supports the x-sgi-task or x-sgi-exec type."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980403-01-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980403-02-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/809.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8556","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980403-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980403-02-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/809.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8556","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0270","sourceIdentifier":"cve@mitre.org","published":"1998-04-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in pfdispaly.cgi program (sometimes referred to as \"pfdisplay\") for SGI's Performer API Search Tool (performer_tools) allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980401-01-P","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/i-041.shtml","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/134","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/64","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/810","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980401-01-P","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/i-041.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/134","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/64","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/810","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1498","sourceIdentifier":"cve@mitre.org","published":"1998-04-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Slackware Linux 3.4 pkgtool allows local attacker to read and write to arbitrary files via a symlink attack on the reply file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/82","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/82","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1505","sourceIdentifier":"cve@mitre.org","published":"1998-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in QuakeWorld 2.10 allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary commands via a long initial connect packet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:id_software:quakeworld:2.10:*:*:*:*:*:*:*","matchCriteriaId":"168BF639-B9D2-4994-948E-D10365797C10"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=89200537415923&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/60","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=89200537415923&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/60","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0009","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:5.4_3.0:*:*:*:*:*:*:*","matchCriteriaId":"2EDB1993-75C9-4738-BDB3-E4433AC202FE"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:5.4_3.1:*:*:*:*:*:*:*","matchCriteriaId":"BB15FBD9-B4F8-42EF-92C2-8D70A2385E3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:5.4_4.1:*:*:*:*:*:*:*","matchCriteriaId":"AA109D17-268F-4E8A-BBA9-0EAA6B46A705"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:5.4_4.11:*:*:*:*:*:*:*","matchCriteriaId":"59EFCFC1-A15C-4B8D-BCCE-DB401A50D23C"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*","matchCriteriaId":"8257C916-6F4D-4B7E-8EED-B2789B3B35AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*","matchCriteriaId":"BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"4DF8869C-2446-48F3-A1CD-70AE44D74EF3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"199F4D8C-2FB9-4AF7-B7A3-339513665616"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*","matchCriteriaId":"41D0212C-EA41-4DF3-9A93-4559545BCD7B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"3567046C-FE3F-424D-A1B0-D7A43D00B79F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*","matchCriteriaId":"40511481-CD42-4EB7-BE2A-7A78964B7D3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*","matchCriteriaId":"D926CDA1-AF2B-4DED-93AE-8F12091E0B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"536CB843-5FF6-4BC1-A6DA-92A8CB69D6D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"E0B4722F-1FBA-4A73-BF85-5920B94F833D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.1t:*:*:*:*:*:*:*","matchCriteriaId":"B7FD1CEC-9064-483C-A3C2-04E3C50EFBEE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"05B1518A-9BBC-4CDB-8338-4DCC9A1A91D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.3:*:*:*:*:*:*:*","matchCriteriaId":"C26983FB-6FD7-4938-8025-E535A6505ADF"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.4:*:*:*:*:*:*:*","matchCriteriaId":"52D01CD7-CE53-44D6-82C6-C72579BA089C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.4b:*:*:*:*:*:*:*","matchCriteriaId":"73F04863-29CB-4E0C-838B-1C23E25C129C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.4t:*:*:*:*:*:*:*","matchCriteriaId":"79AA794C-C18F-48A4-ADCB-DC219DF259CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5:*:*:*:*:*:*:*","matchCriteriaId":"4D4B36C0-D3FF-4B33-B810-DB920062480B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5_iop:*:*:*:*:*:*:*","matchCriteriaId":"C03CED73-9451-4DE4-A00A-7EAB24424CC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5_ipr:*:*:*:*:*:*:*","matchCriteriaId":"29446761-8ACE-4E05-82C3-3FF77C1E2CCB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5a:*:*:*:*:*:*:*","matchCriteriaId":"20B3C51E-DE28-4B50-B841-31CCFEA88A1C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5d:*:*:*:*:*:*:*","matchCriteriaId":"A67E6C0C-F5A4-4591-94B9-3D72221C0933"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5e:*:*:*:*:*:*:*","matchCriteriaId":"7CC66EB2-FFC7-4EF1-9591-A5C5E1E7C919"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5f:*:*:*:*:*:*:*","matchCriteriaId":"85D02672-84E9-4036-8ED8-FE6EF4D7E275"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5g:*:*:*:*:*:*:*","matchCriteriaId":"646483C9-6FFC-46FE-B9CD-40D733FABFD0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4.0.5h:*:*:*:*:*:*:*","matchCriteriaId":"C6B71C71-FA29-4B4C-831C-63AE2797BA2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*","matchCriteriaId":"DD254562-D74A-4D7C-B846-E242D785B830"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"BBFBCFEE-C24C-4D38-83F9-810E05D27901"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*","matchCriteriaId":"BF1C22CE-FF69-44CF-82C3-EBFDA9E7EC0E"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"55DD3C82-0B7D-4B25-B603-AD6C6D59239A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:5.0:*:*:*:*:*:*:*","matchCriteriaId":"1530468C-EDEF-431D-9164-B0D670AF07D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/134","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/134","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0010","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.11mu05:*:*:*:*:*:*:*","matchCriteriaId":"D85C6D97-CF88-4F47-8580-1E1271C3BEB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.12mu03:*:*:*:*:*:*:*","matchCriteriaId":"803355A3-10BA-45DA-AFF7-867A06AEE420"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu01:*:*:*:*:*:*:*","matchCriteriaId":"59665BA5-0818-44E7-9102-62060C88431A"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu02:*:*:*:*:*:*:*","matchCriteriaId":"930A6977-EF72-4693-96E0-603FE096EB4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu03:*:*:*:*:*:*:*","matchCriteriaId":"BDE41F0D-8CCB-4A79-B05E-E08E37B1E15C"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*","matchCriteriaId":"49A7C6F2-F769-447A-8C8B-9002BD6FBF6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","matchCriteriaId":"7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:11:*:*:*:*:*:*:*","matchCriteriaId":"707579B5-701A-4A36-8567-AB2E11759322"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:13:*:*:*:*:*:*:*","matchCriteriaId":"E7C620CF-5046-4A6A-A479-AC315D1E36BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*","matchCriteriaId":"51756048-EB32-4A72-9ED4-937AF2B9DE37"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*","matchCriteriaId":"C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0011","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of Service vulnerabilities in BIND 4.9 and BIND 8 Releases via CNAME record and zone transfer."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:L","baseScore":5.4,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.8,"impactScore":2.5}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-1067"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.11mu05:*:*:*:*:*:*:*","matchCriteriaId":"D85C6D97-CF88-4F47-8580-1E1271C3BEB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.12mu03:*:*:*:*:*:*:*","matchCriteriaId":"803355A3-10BA-45DA-AFF7-867A06AEE420"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu01:*:*:*:*:*:*:*","matchCriteriaId":"59665BA5-0818-44E7-9102-62060C88431A"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu02:*:*:*:*:*:*:*","matchCriteriaId":"930A6977-EF72-4693-96E0-603FE096EB4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu03:*:*:*:*:*:*:*","matchCriteriaId":"BDE41F0D-8CCB-4A79-B05E-E08E37B1E15C"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*","matchCriteriaId":"49A7C6F2-F769-447A-8C8B-9002BD6FBF6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*","matchCriteriaId":"7904F3D9-A6B0-4ED6-8BAD-2D26C118C0F2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:11:*:*:*:*:*:*:*","matchCriteriaId":"707579B5-701A-4A36-8567-AB2E11759322"},{"vulnerable":true,"criteria":"cpe:2.3:o:nec:asl_ux_4800:13:*:*:*:*:*:*:*","matchCriteriaId":"E7C620CF-5046-4A6A-A479-AC315D1E36BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*","matchCriteriaId":"51756048-EB32-4A72-9ED4-937AF2B9DE37"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*","matchCriteriaId":"C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980603-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/180","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9808-083","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0190","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/167","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/167","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1015","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Apple AppleShare Mail Server 5.0.3 on MacOS 8.1 and earlier allows a remote attacker to cause a denial of service (crash) via a long HELO command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:appleshare_mail_server:5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"9BB5CA34-6F8B-42A8-9E2A-C13C648ED379"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=89200657216213&w=2","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/61","source":"cve@mitre.org","tags":["Exploit","Third Party Advisory","VDB Entry"]},{"url":"http://marc.info/?l=bugtraq&m=89200657216213&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/61","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-1040","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerabilities in (1) ipxchk and (2) ipxlink in NetWare Client 1.0 on IRIX 6.3 and 6.4 allows local users to gain root access via a modified IFS environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980501-01-P2869","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-055.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=89217373930054&w=2","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980501-01-P2869","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-055.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=89217373930054&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1114","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Korn Shell (ksh) suid_exec program on IRIX 6.x and earlier, and possibly other operating systems, allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"D792E16B-A1AB-4BCE-9E6E-88C17D4F57CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"30F950B1-7D5F-4CA9-BBEF-E6DB1A28C156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.17.suid_exec.vul","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980405-01-I","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-15a.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/467","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2100","source":"cve@mitre.org"},{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AA-96.17.suid_exec.vul","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980405-01-I","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-15a.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/467","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2100","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1501","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"(1) ipxchk and (2) ipxlink in SGI OS2 IRIX 6.3 does not properly clear the IFS environmental variable before executing system calls, which allows local users to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=89217373930054&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/70","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/71","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=89217373930054&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/70","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/71","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1502","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Quake 1.9 client allows remote malicious servers to execute arbitrary commands via long (1) precache paths, (2) server name, (3) server address, or (4) argument to the map console command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:id_software:quake:1.9:*:*:*:*:*:*:*","matchCriteriaId":"61028BF2-6AF9-4145-B096-DA93E3197040"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=89205623028934&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/68","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/69","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=89205623028934&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/68","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/69","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1503","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Network Flight Recorder (NFR) 1.5 and 1.6 allows remote attackers to cause a denial of service in nfrd (crash) via a TCP packet with a null header and data field."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nfr:nfr:1.5:*:*:*:*:*:*:*","matchCriteriaId":"9C2B2622-BCD5-4B08-B153-22FEAC6D89EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:nfr:nfr:1.6:*:*:*:*:*:*:*","matchCriteriaId":"F465E2E8-5B0F-40E7-A05B-620251B69DB4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/63","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/63","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1504","sourceIdentifier":"cve@mitre.org","published":"1998-04-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Stalker Internet Mail Server 1.6 allows a remote attacker to cause a denial of service (crash) via a long HELO command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stalker:stalker_internet_mail_server:1.6:*:*:*:*:*:*:*","matchCriteriaId":"014D31E5-50A1-41DE-BC8B-A9C7744D3D82"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8951","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/62","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/8951","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/62","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1499","sourceIdentifier":"cve@mitre.org","published":"1998-04-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"named in ISC BIND 4.9 and 8.1 allows local users to destroy files via a symlink attack on (1) named_dump.db when root kills the process with a SIGINT, or (2) named.stats when SIGIOT is used."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*","matchCriteriaId":"49A7C6F2-F769-447A-8C8B-9002BD6FBF6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*","matchCriteriaId":"BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/8966","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/80","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/8966","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/80","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1113","sourceIdentifier":"cve@mitre.org","published":"1998-04-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Eudora Internet Mail Server (EIMS) 2.01 and earlier on MacOS systems allows remote attackers to cause a denial of service via a long USER command to port 106."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eudora:internet_mail_server:*:*:*:*:*:*:*:*","versionEndIncluding":"2.01","matchCriteriaId":"794243C7-D921-48D0-8551-E48392C4F2A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:eudora:internet_mail_server:1.2:*:*:*:*:*:*:*","matchCriteriaId":"E4B446B6-174D-4D84-9444-143E58E3BF6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:eudora:internet_mail_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"187BD926-036F-46E3-83B9-2BC037A3D5E7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=89258194718577&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/75","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=89258194718577&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/75","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1390","sourceIdentifier":"cve@mitre.org","published":"1998-04-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"suidexec in suidmanager 0.18 on Debian 2.0 allows local users to gain root privileges by specifying a malicious program on the command line."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"}]}]}],"references":[{"url":"http://darwin.bio.uci.edu/~mcoogan/bugtraq/msg00890.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94","source":"cve@mitre.org"},{"url":"http://darwin.bio.uci.edu/~mcoogan/bugtraq/msg00890.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/94","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0069","sourceIdentifier":"cve@mitre.org","published":"1998-04-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris ufsrestore buffer overflow."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":8.4,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":2.5,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/169","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8158","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/169","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8158","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0212","sourceIdentifier":"cve@mitre.org","published":"1998-04-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris rpc.mountd generates error messages that allow a remote attacker to determine what files are on the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/168","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/i-048.shtml","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/168","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/i-048.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}},{"cve":{"id":"CVE-1999-1106","sourceIdentifier":"cve@mitre.org","published":"1998-04-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in kppp in KDE allows local users to gain root access via a long -c (account_name) command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:*:*:*:*:*:*:*:*","matchCriteriaId":"D54C9BCD-7544-4005-8F61-45C3EC054385"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9121","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/92","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1643","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9121","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/92","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1643","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0108","sourceIdentifier":"cve@mitre.org","published":"1998-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The printers program in IRIX has a buffer overflow that gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]}],"references":[{"url":"http://seclists.org/bugtraq/1997/May/191","source":"cve@mitre.org"},{"url":"http://seclists.org/bugtraq/1997/May/191","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0796","sourceIdentifier":"cve@mitre.org","published":"1998-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD T/TCP Extensions for Transactions can be subjected to spoofing attacks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"}]}]}],"references":[{"url":"http://www.osvdb.org/6089","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6089","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0126","sourceIdentifier":"cve@mitre.org","published":"1998-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI IRIX buffer overflow in xterm and Xaw allows root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:xfree86:*:*:*:*:*:*:*:*","matchCriteriaId":"11B50724-87F2-4250-BB69-C20E050C3146"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-010.shtml","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-010.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1027","sourceIdentifier":"cve@mitre.org","published":"1998-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris 2.6 HW3/98 installs admintool with world-writable permissions, which allows local users to gain privileges by replacing it with a Trojan horse program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221101925880&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/290","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7296","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221101925880&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/290","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7296","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1044","sourceIdentifier":"cve@mitre.org","published":"1998-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Advanced File System Utility (advfs) in Digital UNIX 4.0 through 4.0d allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:*:*:*:*:*:*:*:*","versionEndIncluding":"v4.0d","matchCriteriaId":"4223D0CB-F8AE-4786-92A4-E8D695541525"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:v4.0:*:*:*:*:*:*:*","matchCriteriaId":"6F1EAD30-C252-42BD-A5F6-1E2A285F0061"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/i-050.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-050.shtml","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7431.php","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-050.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-050.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7431.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1361","sourceIdentifier":"cve@mitre.org","published":"1998-05-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 3.51 and 4.0 running WINS (Windows Internet Name Service) allows remote attackers to cause a denial of service (resource exhaustion) via a flood of malformed packets, which causes the server to slow down and fill the event logs with error messages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D0D4EAC2-A948-461F-B5DD-0AE73CF05D29"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221101925891&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221101925891&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0816","sourceIdentifier":"cve@mitre.org","published":"1998-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Motorola CableRouter allows any remote user to connect to and configure the router on port 1024."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:motorola:motorola_cablerouter:*:*:*:*:*:*:*:*","matchCriteriaId":"AE17FEA2-BF36-418D-9E34-29928ACDE8F1"}]}]}],"references":[{"url":"http://www.netspace.org/cgi-bin/wa?A2=ind9805B&L=bugtraq&P=R1621","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.netspace.org/cgi-bin/wa?A2=ind9805B&L=bugtraq&P=R1621","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0919","sourceIdentifier":"cve@mitre.org","published":"1998-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A memory leak in a Motorola CableRouter allows remote attackers to conduct a denial of service via a large number of telnet connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:motorola:motorola_cablerouter:*:*:*:*:*:*:*:*","matchCriteriaId":"AE17FEA2-BF36-418D-9E34-29928ACDE8F1"}]}]}],"references":[{"url":"http://www.netspace.org/cgi-bin/wa?A2=ind9805B&L=bugtraq&P=R1621","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2004","source":"cve@mitre.org"},{"url":"http://www.netspace.org/cgi-bin/wa?A2=ind9805B&L=bugtraq&P=R1621","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2004","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1204","sourceIdentifier":"cve@mitre.org","published":"1998-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Check Point Firewall-1 does not properly handle certain restricted keywords (e.g., Mail, auth, time) in user-defined objects, which could produce a rule with a default \"ANY\" address and result in access to more systems than intended by the administrator."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:*:*:*:*:*:*:*:*","matchCriteriaId":"85711114-A402-4B53-AA91-DC66937606F1"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221101925912&w=2","source":"cve@mitre.org"},{"url":"http://www.checkpoint.com/techsupport/config/keywords.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4416","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7293","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221101925912&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.checkpoint.com/techsupport/config/keywords.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4416","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7293","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1389","sourceIdentifier":"cve@mitre.org","published":"1998-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"US Robotics/3Com Total Control Chassis with Frame Relay between 3.6.22 and 3.7.24 does not properly enforce access filters when the \"set host prompt\" setting is made for a port, which allows attackers to bypass restrictions by providing the hostname twice at the \"host: \" prompt."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:3com:total_control_netserver_card:*:*:*:*:*:*:*:*","versionEndIncluding":"3.7.24","matchCriteriaId":"4E6281AA-520E-4694-94A9-0F40EDB62A98"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221101925916&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/99","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=90221101925916&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/99","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0055","sourceIdentifier":"cve@mitre.org","published":"1998-05-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Sun libnsl allow root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"55919E74-09E7-44BA-9941-D1B69BB1692F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/172","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX80543&apar=only","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/172","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX80543&apar=only","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1179","sourceIdentifier":"cve@mitre.org","published":"1998-05-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in man.sh CGI script, included in May 1998 issue of SysAdmin Magazine, allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sysadmin_magazine:man.sh:*:*:*:*:*:*:*:*","matchCriteriaId":"5E300C52-C018-42B6-9EF5-AB99BC43B3CB"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9330","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/9330","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1096","sourceIdentifier":"cve@mitre.org","published":"1998-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.0:*:*:*:*:*:*:*","matchCriteriaId":"30661C23-9BE4-4F6E-AEB9-1B9D7DAA6FC9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221101925954&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221101925959&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1644","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221101925954&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221101925959&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1644","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0303","sourceIdentifier":"cve@mitre.org","published":"1998-05-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in BNU UUCP daemon (uucpd) through long hostnames."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:osf_1:1.1:*:*:*:*:*:*:*","matchCriteriaId":"7FE849FB-8F06-4430-B646-6C7024EADD4E"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5CB726CF-ADA2-4CDA-9786-1E84AC53740A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"1FC373FC-88AC-4B6D-A289-51881ACD57F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*","matchCriteriaId":"FEEC0C5A-4A6E-403C-B929-D1EC8B0FE2A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:1.1.3:u1:*:*:*:*:*:*","matchCriteriaId":"D3373737-C6FC-4D19-845C-B0382AE1DC48"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:1.1.4:*:jl:*:*:*:*:*","matchCriteriaId":"10EC0267-500D-496F-9D88-7F93F7D4A88B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0303","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0303","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1039","sourceIdentifier":"cve@mitre.org","published":"1998-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in (1) diskalign and (2) diskperf in IRIX 6.4 patches 2291 and 2848 allow a local user to create root-owned files leading to a root compromise."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980502-01-P3030","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980502-01-P3030","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1492","sourceIdentifier":"cve@mitre.org","published":"1998-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980502-01-P3030","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/348","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2103","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2104","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980502-01-P3030","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/348","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2104","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1490","sourceIdentifier":"cve@mitre.org","published":"1998-05-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"xosview 1.5.1 in Red Hat 5.1 allows local users to gain root access via a long HOME environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221101926021&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221101926034&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/8787.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/362","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=90221101926021&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221101926034&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/8787.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/362","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0278","sourceIdentifier":"cve@mitre.org","published":"1998-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In IIS, remote attackers can obtain source code for ASP files by appending \"::$DATA\" to the URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-003","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A913","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-003","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A913","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0329","sourceIdentifier":"cve@mitre.org","published":"1998-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI mediad program allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*","matchCriteriaId":"333103D5-71B8-4DC1-90F7-15F2841955D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8A889C10-0637-4133-AFBD-533C8397BE89"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980602-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980602-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0501","sourceIdentifier":"cve@mitre.org","published":"1998-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Unix account has a guessable password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0501","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0501","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0508","sourceIdentifier":"cve@mitre.org","published":"1998-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An account on a router, firewall, or other network device has a default, null, blank, or missing password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0508","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0508","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1443","sourceIdentifier":"cve@mitre.org","published":"1998-06-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Micah Software Full Armor Network Configurator and Zero Administration allow local users with physical access to bypass the desktop protection by (1) using <CTRL><ALT><DEL> and kill the process using the task manager, (2) booting the system from a separate disk, or (3) interrupting certain processes that execute while the system is booting."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:micah_software:full_armor:*:*:*:*:*:*:*:*","matchCriteriaId":"DDB0D068-DC17-440C-B83D-5761197FF3FA"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221103125869&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103125889&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/103","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103125869&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221103125889&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/103","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1151","sourceIdentifier":"cve@mitre.org","published":"1998-06-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Compaq/Microcom 6000 Access Integrator does not cause a session timeout after prompting for a username or password, which allows remote attackers to cause a denial of service by connecting to the integrator without providing a username or password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:compaq_microcom:microcom_6000_access_integrator:initial:*:*:*:*:*:*:*","matchCriteriaId":"A95C8121-5757-41B3-A633-E96D847E8758"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90296493106214&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2089","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90296493106214&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2089","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1152","sourceIdentifier":"cve@mitre.org","published":"1998-06-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Compaq/Microcom 6000 Access Integrator does not disconnect a client after a certain number of failed login attempts, which allows remote attackers to guess usernames or passwords via a brute force attack."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-307"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:compaq:microcom_6000_firmware:-:*:*:*:*:*:*:*","matchCriteriaId":"15D5A948-4AC0-458B-BE97-9645C403B476"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:compaq:microcom_6000:-:*:*:*:*:*:*:*","matchCriteriaId":"4591EAE6-42A5-409D-A480-7B80CE152043"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90296493106214&w=2","source":"cve@mitre.org","tags":["Mailing List"]},{"url":"http://marc.info/?l=bugtraq&m=90296493106214&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]}]}},{"cve":{"id":"CVE-1999-0008","sourceIdentifier":"cve@mitre.org","published":"1998-06-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NIS+, in Sun's rpc.nisd program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*","matchCriteriaId":"CFD50216-90AC-480E-A11C-E88E64C6D84A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/170","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/170","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0054","sourceIdentifier":"cve@mitre.org","published":"1998-06-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sun's ftpd daemon can be subjected to a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/171","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/171","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1178","sourceIdentifier":"cve@mitre.org","published":"1998-06-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sambar Server 4.1 beta allows remote attackers to obtain sensitive information about the server via an HTTP request for the dumpenv.pl script."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sambar:sambar_server:4.1:beta:*:*:*:*:*:*","matchCriteriaId":"AC67D71C-1FBE-452B-BB91-EF29AB699CEC"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9505","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3223","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9505","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3223","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1271","sourceIdentifier":"cve@mitre.org","published":"1998-06-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Macromedia Dreamweaver uses weak encryption to store FTP passwords, which could allow local users to easily decrypt the passwords of other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:macromedia:dreamweaver:initial:*:*:*:*:*:*:*","matchCriteriaId":"20ACC8F7-47AF-4298-8104-E531035D16DF"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9511","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1636","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9511","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1636","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1480","sourceIdentifier":"cve@mitre.org","published":"1998-06-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"(1) acledit and (2) aclput in AIX 4.3 allow local users to create or modify files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:N/I:P/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/429","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/429","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1555","sourceIdentifier":"cve@mitre.org","published":"1998-06-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cheyenne InocuLAN Anti-Virus Server in Inoculan 4.0 before Service Pack 2 creates an update directory with \"EVERYONE FULL CONTROL\" permissions, which allows local users to cause Inoculan's antivirus update feature to install a Trojan horse dll."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cheyenne:inoculan_anti-virus_server:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"D6EED70A-2454-49B0-8F1B-11F08F35ECC3"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9515","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/106","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1536","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9515","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/106","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1536","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1085","sourceIdentifier":"cve@mitre.org","published":"1998-06-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SSH 1.2.25, 1.2.23, and other versions, when used in in CBC (Cipher Block Chaining) or CFB (Cipher Feedback 64 bits) modes, allows remote attackers to insert arbitrary data into an existing stream between an SSH client and server by using a known plaintext attack and computing a valid CRC-32 checksum for the packet, aka the \"SSH insertion attack.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:secure_shell:1.2.23:*:*:*:*:*:*:*","matchCriteriaId":"4E0D7922-3968-4469-BF37-D99978F2CD8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:secure_shell:1.2.25:*:*:*:*:*:*:*","matchCriteriaId":"1D829774-3507-4145-91B4-273E3EA90E9A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221103125884&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525878&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/1126.php","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/13877","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://marc.info/?l=bugtraq&m=90221103125884&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221104525878&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/1126.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/13877","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]}]}},{"cve":{"id":"CVE-1999-0783","sourceIdentifier":"cve@mitre.org","published":"1998-06-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD allows local users to conduct a denial of service by creating a hard link from a device special file to a file on an NFS file system."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/i-057.shtml","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.osvdb.org/6090","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.ciac.org/ciac/bulletins/i-057.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.osvdb.org/6090","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}},{"cve":{"id":"CVE-1999-1442","sourceIdentifier":"cve@mitre.org","published":"1998-06-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Bug in AMD K6 processor on Linux 2.0.x and 2.1.x kernels allows local users to cause a denial of service (crash) via a particular sequence of instructions, possibly related to accessing addresses outside of segments."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.0.0","versionEndIncluding":"2.0.39","matchCriteriaId":"91A62C26-D718-4180-8499-BCF7CAB7B6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.1.0","versionEndIncluding":"2.1.132","matchCriteriaId":"2FC25C71-E25A-47E1-913E-BD493B4C136C"}]}]}],"references":[{"url":"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"]},{"url":"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/105","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://uwsg.iu.edu/hypermail/linux/kernel/9805.3/0855.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"]},{"url":"http://www.cs.helsinki.fi/linux/linux-kernel/Year-1998/1998-25/0816.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory"]},{"url":"http://www.securityfocus.com/bid/105","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-1479","sourceIdentifier":"cve@mitre.org","published":"1998-06-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The textcounter.pl by Matt Wright allows remote attackers to execute arbitrary commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:textcounter:1.2:*:*:*:*:*:*:*","matchCriteriaId":"5A18692E-E666-4F57-A2F4-359775E6CA19"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9609","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/2265","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2052","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9609","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/2265","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2052","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0007","sourceIdentifier":"cve@mitre.org","published":"1998-06-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Information from SSL-encrypted sessions via PKCS #1."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-327"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:c2net:stonghold_web_server:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"90FA74D1-FF25-44C0-B86C-FBE74A0206CB"},{"vulnerable":true,"criteria":"cpe:2.3:a:c2net:stonghold_web_server:2.2:*:*:*:*:*:*:*","matchCriteriaId":"7E7F153A-5396-4C3C-995B-570D13DB6B2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:c2net:stonghold_web_server:2.3:*:*:*:*:*:*:*","matchCriteriaId":"BBDFAE58-F8CC-453F-A006-532212B21F94"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:open_market_secure_webserver:2.1:*:*:*:*:*:*:*","matchCriteriaId":"CA2E007E-898A-4EC7-9040-A02DABA3A5B6"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*","matchCriteriaId":"B4F9C143-4734-4E5D-9281-F51513C5CAAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*","matchCriteriaId":"72E930EF-CCEC-44EA-AA45-18644EFDA5F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:collabra_server:3.5.2:*:*:*:*:*:*:*","matchCriteriaId":"B49C090C-979F-44F2-BAAC-71E11611BDF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*","matchCriteriaId":"1CD1E4C9-BFF1-4818-A1B8-ECD7B54C8B03"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*","matchCriteriaId":"492922BE-3B31-486C-94B5-114089E51E53"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*","matchCriteriaId":"70E0FF18-9B01-4500-9599-8F085655C388"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"9E5E0298-99D9-476D-A7DF-36C6207482DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*","matchCriteriaId":"D94D2CA3-9868-4F27-B31D-D3EDC256BE5A"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"4147A43C-DA7B-4D08-90E9-72DE57B1D61D"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:fasttrack_server:3.01b:*:*:*:*:*:*:*","matchCriteriaId":"55193435-0136-422D-A936-B1FEEC328A0A"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:messaging_server:3.54:*:*:*:*:*:*:*","matchCriteriaId":"11AA27C0-D579-49E6-8479-D5DFFAC96D4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:proxy_server:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"E47FCF41-3D06-493B-AD7B-626F4C279944"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssleay:ssleay:0.6.6:*:*:*:*:*:*:*","matchCriteriaId":"64568219-B33C-4507-9E04-536E7B11D2F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*","matchCriteriaId":"29C56055-3DB2-4A23-8301-6F6AB4BA38AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*","matchCriteriaId":"76F1B179-25A4-4A72-9E42-43DA61CA1475"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1036","sourceIdentifier":"cve@mitre.org","published":"1998-06-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"COPS 1.04 allows local users to overwrite or create arbitrary files via a symlink attack on temporary files in (1) res_diff, (2) ca.src, and (3) mail.chk."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cops:cops:1.04:*:*:*:*:*:*:*","matchCriteriaId":"DA637C49-E2E3-4691-8075-E5E9B88F0B9B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221103125976&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103125976&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1037","sourceIdentifier":"cve@mitre.org","published":"1998-06-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rex.satan in SATAN 1.1.1 allows local users to overwrite arbitrary files via a symlink attack on the /tmp/rex.$$ file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:coast:satan:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"68B95230-3074-4D66-AE18-DB678565C48D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221103125976&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103125986&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7167.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3147","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103125976&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221103125986&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7167.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3147","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1038","sourceIdentifier":"cve@mitre.org","published":"1998-06-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Tiger 2.2.3 allows local users to overwrite arbitrary files via a symlink attack on various temporary files in Tiger's default working directory, as defined by the WORKDIR variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tamu:tiger:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"097F55B7-FA47-4BB9-B816-08382B0642A9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221103125976&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103125976&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0797","sourceIdentifier":"cve@mitre.org","published":"1998-06-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NIS finger allows an attacker to conduct a denial of service via a large number of finger requests, resulting in a large number of NIS queries."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:N/A:P","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/i-070.shtml","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/i-070.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1556","sourceIdentifier":"cve@mitre.org","published":"1998-06-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft SQL Server 6.5 uses weak encryption for the password for the SQLExecutiveCmdExec account and stores it in an accessible portion of the registry, which could allow local users to gain privileges by reading and decrypting the CmdExecAccount value."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:6.5:*:*:*:*:*:*:*","matchCriteriaId":"08CB788D-CFEC-4F8B-9158-8A15319FAB49"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=90222453431645&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/109","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7354","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=90222453431645&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/109","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7354","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1150","sourceIdentifier":"cve@mitre.org","published":"1998-06-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:livingston_portmaster:portmaster:initial:*:*:*:*:*:*:*","matchCriteriaId":"CBBFF404-7EDB-417C-B530-7EDEC38B3475"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9723","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1882","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9723","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1882","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1441","sourceIdentifier":"cve@mitre.org","published":"1998-06-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux 2.0.34 does not properly prevent users from sending SIGIO signals to arbitrary processes, which allows local users to cause a denial of service by sending SIGIO to processes that do not catch it."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*","matchCriteriaId":"92555500-16EB-4F76-B2C7-61A00A1AC722"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221103126047&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/111","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103126047&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/111","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0313","sourceIdentifier":"cve@mitre.org","published":"1998-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"disk_bandwidth on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:s2mp:*:*:*:*:*","matchCriteriaId":"666EAE84-F406-41F9-8C80-A349E83BCB64"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980701-01-P","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/936","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/213/exploit","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/214","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1441","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980701-01-P","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/936","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/213/exploit","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/214","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1441","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0314","sourceIdentifier":"cve@mitre.org","published":"1998-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ioconfig on SGI IRIX 6.4 S2MP for Origin/Onyx2 allows local users to gain root access using relative pathnames."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980701-01-P","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6788","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/213","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/213/exploit","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1199","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980701-01-P","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6788","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/213","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/213/exploit","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1199","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0494","sourceIdentifier":"cve@mitre.org","published":"1998-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in WinGate proxy through a buffer overflow in POP3."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wingate:wingate:*:*:*:*:*:*:*:*","matchCriteriaId":"131D0843-A33F-46F7-8F01-F2C0051F0737"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0494","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0494","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1202","sourceIdentifier":"cve@mitre.org","published":"1998-07-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"StarTech (1) POP3 proxy server and (2) telnet server allows remote attackers to cause a denial of service via a long USER command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:startech:pop3_proxy_server:*:*:*:*:*:*:*:*","matchCriteriaId":"9761271D-FC0A-4E3B-9180-DE743A9403A0"},{"vulnerable":true,"criteria":"cpe:2.3:a:startech:telnet_server:*:*:*:*:*:*:*:*","matchCriteriaId":"0C39E2DA-B549-47B4-A425-D097B2F55F7F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525873&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2088","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525873&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2088","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1409","sourceIdentifier":"cve@mitre.org","published":"1998-07-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"36B60E50-4F5A-4404-BEA3-C94F7D27B156"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.2","matchCriteriaId":"071B436C-4D6F-4C7D-943E-C682B29A9701"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"55DD3C82-0B7D-4B25-B603-AD6C6D59239A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"}]}]}],"references":[{"url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA1998-004.txt.asc","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90233906612929&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7577.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/331","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.shmoo.com/mail/bugtraq/jul98/msg00064.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA1998-004.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90233906612929&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7577.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/331","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.shmoo.com/mail/bugtraq/jul98/msg00064.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1574","sourceIdentifier":"cve@mitre.org","published":"1998-07-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the lex routines of nslookup for AIX 4.3 may allow attackers to cause a core dump and possibly execute arbitrary code via \"long input strings.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"92B77367-8BF2-4E68-A7F1-D0780E102CCA"}]}]}],"references":[{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX79909&apar=only","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/182777","source":"cve@mitre.org","tags":["Patch","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7867","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IX79909&apar=only","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/182777","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7867","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1437","sourceIdentifier":"cve@mitre.org","published":"1998-07-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ePerl 2.2.12 allows remote attackers to read arbitrary files and possibly execute certain commands by specifying a full pathname of the target file as an argument to bar.phtml."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ralf_s._engelschall:eperl:2.2.12:*:*:*:*:*:*:*","matchCriteriaId":"DAEFD4F6-73A1-4011-ABAE-5C5E86CB535A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525890&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525927&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/151","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525890&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221104525927&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/151","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1436","sourceIdentifier":"cve@mitre.org","published":"1998-07-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ray Chan WWW Authorization Gateway 0.1 CGI program allows remote attackers to execute arbitrary commands via shell metacharacters in the \"user\" parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ray_chan:www_authorization_gateway:0.1:*:*:*:*:*:*:*","matchCriteriaId":"0937E18C-BABE-41E7-8648-03B55687A5F7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525905&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/152","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525905&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/152","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0102","sourceIdentifier":"cve@mitre.org","published":"1998-07-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SLmail 3.x allows attackers to execute commands using a large FROM line."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seattle_lab_software:slmail:3.0.2421:*:*:*:*:*:*:*","matchCriteriaId":"B582E8B5-0BF7-48C6-B92A-C617D1B9F576"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0102","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0102","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1435","sourceIdentifier":"cve@mitre.org","published":"1998-07-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in libsocks5 library of Socks 5 (socks5) 1.0r5 allows local users to gain privileges via long environmental variables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nec:socks_5:1.0r5:*:*:*:*:*:*:*","matchCriteriaId":"85476271-78BE-4958-9A84-9EDC96C16463"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525933&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/154","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525933&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/154","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1270","sourceIdentifier":"cve@mitre.org","published":"1998-07-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KMail in KDE 1.0 provides a PGP passphrase as a command line argument to other programs, which could allow local users to obtain the passphrase and compromise the PGP keys of other users by viewing the arguments via programs that list process information, such as ps."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.0:*:*:*:*:*:*:*","matchCriteriaId":"30661C23-9BE4-4F6E-AEB9-1B9D7DAA6FC9"}]}]}],"references":[{"url":"http://lists.kde.org/?l=kde-devel&m=90221974029738&w=2","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1639","source":"cve@mitre.org"},{"url":"http://lists.kde.org/?l=kde-devel&m=90221974029738&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1639","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1434","sourceIdentifier":"cve@mitre.org","published":"1998-07-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"login in Slackware Linux 3.2 through 3.5 does not properly check for an error when the /etc/group file is missing, which prevents it from dropping privileges, causing it to assign root privileges to any local user who logs on to the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.1:*:*:*:*:*:*:*","matchCriteriaId":"9FDBA67D-84A7-42D6-A994-7C967B6306D3"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.2:*:*:*:*:*:*:*","matchCriteriaId":"852B55FE-8180-4357-B717-399C16954C6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*","matchCriteriaId":"06F2131E-F9F2-4E65-B95C-B52DB25C69F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*","matchCriteriaId":"125918E7-53BB-407A-8D95-5D95CDF39A88"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525951&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/155","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525951&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/155","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0006","sourceIdentifier":"cve@mitre.org","published":"1998-07-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-125"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:2.4:*:*:*:*:*:*:*","matchCriteriaId":"66652CF8-971D-4DF6-9BD5-A736BD54F9DF"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980801-01-I","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/133","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980801-01-I","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/133","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0213","sourceIdentifier":"cve@mitre.org","published":"1998-07-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"libnsl in Solaris allowed an attacker to perform a denial of service of rpcbind."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9749","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/9749","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1297","sourceIdentifier":"cve@mitre.org","published":"1998-07-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"cmdtool in OpenWindows 3.0 and XView 3.0 in SunOS 4.1.4 and earlier allows attackers with physical access to the system to display unechoed characters (such as those from password prompts) via the L2/AGAIN key."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B5955AC0-3036-4943-B6BD-52DD3E039089"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100452&zone_32=10045%2A%20","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7482","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fpatches%2F100452&zone_32=10045%2A%20","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7482","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1433","sourceIdentifier":"cve@mitre.org","published":"1998-07-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP JetAdmin D.01.09 on Solaris allows local users to change the permissions of arbitrary files via a symlink attack on the /tmp/jetadmin.log file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:jetadmin:rev._d.01.09:*:*:*:*:*:*:*","matchCriteriaId":"80A1877A-2746-47C0-8ABC-C65F37AE0B81"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525988&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526067&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/157","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525988&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221104526067&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/157","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1582","sourceIdentifier":"cve@mitre.org","published":"1998-07-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"By design, the \"established\" command on the Cisco PIX firewall allows connections from one host to arbitrary ports of a target host if an alternative conduit has already been allowed, which can cause administrators to configure less restrictive access controls than intended if they do not understand this functionality."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:pix_firewall:*:*:*:*:*:*:*:*","matchCriteriaId":"A9C63DA6-1FBC-431A-9D8A-66EA93225294"}]}]}],"references":[{"url":"http://www.cisco.com/warp/public/707/pixest-pub.shtml","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/6733","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8052","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/707/pixest-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/6733","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8052","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0263","sourceIdentifier":"cve@mitre.org","published":"1998-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris SUNWadmap can be exploited to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/173","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/173","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1149","sourceIdentifier":"cve@mitre.org","published":"1998-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CSM Proxy 4.1 allows remote attackers to cause a denial of service (crash) via a long string to the FTP port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:computer_software_manufaktur:csm_proxy:4.1:*:*:*:*:*:*:*","matchCriteriaId":"B2F03FC7-4EB8-4F7E-8639-B5E5169F3E1C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525993&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1422","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525993&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1422","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1432","sourceIdentifier":"cve@mitre.org","published":"1998-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Power management (Powermanagement) on Solaris 2.4 through 2.6 does not start the xlock process until after the sys-suspend has completed, which allows an attacker with physical access to input characters to the last active application from the keyboard for a short period after the system is restoring, which could lead to increased privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104525997&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/160","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104525997&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/160","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1558","sourceIdentifier":"cve@mitre.org","published":"1998-07-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in loginout in Digital OpenVMS 7.1 and earlier allows unauthorized access when external authentication is enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:digital:digital_openvms:7.1:*:*:*:*:*:*:*","matchCriteriaId":"4D773082-EEC5-489D-93BB-EB3236B72FE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:digital:digital_openvms_axp:7.1:*:*:*:*:*:*:*","matchCriteriaId":"9221659C-04A7-4051-A8B4-F54EE4BEE497"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/i-071a.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7151.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/161","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-071a.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7151.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/161","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0005","sourceIdentifier":"cve@mitre.org","published":"1998-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Arbitrary command execution via IMAP buffer overflow in authenticate command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:messaging_server:3.55:*:*:*:*:*:*:*","matchCriteriaId":"26CE0F92-0E43-454D-B996-428FD8A72E11"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:imap:10.234:*:*:*:*:*:*:*","matchCriteriaId":"8BBB1912-BA9F-4856-A5AA-136B06E7A083"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/177","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/130","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/177","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/130","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1200","sourceIdentifier":"cve@mitre.org","published":"1998-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vintra SMTP MailServer allows remote attackers to cause a denial of service via a malformed \"EXPN *@\" command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vintra_systems:smtp_mailserver:*:*:*:*:*:*:*:*","matchCriteriaId":"5C697500-EEA2-4562-A234-273ABF8A1103"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=90222454131610&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1617","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=90222454131610&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1617","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1420","sourceIdentifier":"cve@mitre.org","published":"1998-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NBase switches NH2012, NH2012R, NH2015, and NH2048 have a back door password that cannot be disabled, which allows remote attackers to modify the switch's configuration."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:n-base:nh2012:2.53:*:*:*:*:*:*:*","matchCriteriaId":"9400D8E4-D489-462D-9785-5345F4C1E1AA"},{"vulnerable":true,"criteria":"cpe:2.3:h:n-base:nh2012r:2.53:*:*:*:*:*:*:*","matchCriteriaId":"CDE6FECC-2094-425B-82F2-2038E6F2EA4C"},{"vulnerable":true,"criteria":"cpe:2.3:h:n-base:nh2015:2.51:*:*:*:*:*:*:*","matchCriteriaId":"E05D6ADC-5CC0-443E-B1E3-FFA023CC6D56"},{"vulnerable":true,"criteria":"cpe:2.3:h:n-base:nh2048:1.33:*:*:*:*:*:*:*","matchCriteriaId":"0B54BAA0-7861-4DCC-A308-8DA4A71CAFCF"},{"vulnerable":true,"criteria":"cpe:2.3:h:n-base:nh3012:2.1:*:*:*:*:*:*:*","matchCriteriaId":"14FEE263-6B97-401A-A01A-E21E08CDA503"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104526016&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526065&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/212","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526016&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221104526065&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/212","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1421","sourceIdentifier":"cve@mitre.org","published":"1998-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NBase switches NH208 and NH215 run a TFTP server which allows remote attackers to send software updates to modify the switch or cause a denial of service (crash) by guessing the target filenames, which have default names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:n-base:nh208:*:*:*:*:*:*:*:*","matchCriteriaId":"97E779FF-4447-4F7B-99D7-6B961D81391F"},{"vulnerable":true,"criteria":"cpe:2.3:h:n-base:nh215:*:*:*:*:*:*:*:*","matchCriteriaId":"37881B2D-A2D4-4006-9C38-559D1B19A286"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104526016&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526065&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/212","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526016&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221104526065&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/212","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1070","sourceIdentifier":"cve@mitre.org","published":"1998-07-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ping CGI program in Xylogics Annex terminal service allows remote attackers to cause a denial of service via a long query parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xylogics:annex:*:*:*:*:*:*:*:*","matchCriteriaId":"61A47022-B84F-4458-8E3C-0F675E803D7A"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/10021","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/10021","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0941","sourceIdentifier":"cve@mitre.org","published":"1998-07-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Mutt mail client allows a remote attacker to execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mutt:mutt:0.95.6:*:*:*:*:*:*:*","matchCriteriaId":"7D43FB4B-1E1A-4F07-9587-09E335565654"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104526154&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526154&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1447","sourceIdentifier":"cve@mitre.org","published":"1998-07-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.0 allows remote attackers to cause a denial of service (crash) via HTML code that contains a long CLASSID parameter in an OBJECT tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104526169&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526188&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526169&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221104526188&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1406","sourceIdentifier":"cve@mitre.org","published":"1998-07-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dumpreg in Red Hat Linux 5.1 opens /dev/mem with O_RDWR access, which allows local users to cause a denial of service (crash) by redirecting fd 1 (stdout) to the kernel."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104526185&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526192&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/372","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526185&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90221104526192&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/372","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1448","sourceIdentifier":"cve@mitre.org","published":"1998-07-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Eudora and Eudora Light before 3.05 allows remote attackers to cause a crash and corrupt the user's mailbox via an e-mail message with certain dates, such as (1) dates before 1970, which cause a Divide By Zero error, or (2) dates that are 100 years after the current date, which causes a segmentation fault."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*","versionEndIncluding":"3.05","matchCriteriaId":"AB4BC854-4F0F-49E2-9835-CC60917B0F95"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora_light:*:*:*:*:*:*:*:*","versionEndIncluding":"3.05","matchCriteriaId":"89CC80BD-750C-4EB7-8FA5-669C0A3DF5F6"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221104526168&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221104526168&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1136","sourceIdentifier":"cve@mitre.org","published":"1998-07-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Predictive on HP-UX 11.0 and earlier, and MPE/iX 5.5 and earlier, allows attackers to compromise data transfer for Predictive messages (using e-mail or modem) between customer and Response Center Predictive systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*","versionEndIncluding":"5.5","matchCriteriaId":"7698B452-3096-40D1-8770-FAC2C539C6FC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:mpe_ix:5.0:*:*:*:*:*:*:*","matchCriteriaId":"529F6FE1-96F5-47C3-8E0D-22A461002A55"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","versionEndIncluding":"11.00","matchCriteriaId":"59AD3EDE-3ABD-4686-98CB-42BB56345AE3"}]}]}],"references":[{"url":"http://cert.ip-plus.net/bulletin-archive/msg00040.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=90221104526177&w=2","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/i-081.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9807-081.html","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1413","source":"cve@mitre.org"},{"url":"http://cert.ip-plus.net/bulletin-archive/msg00040.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=90221104526177&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/i-081.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.codetalker.com/advisories/vendor/hp/hpsbux9807-081.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1413","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0269","sourceIdentifier":"cve@mitre.org","published":"1998-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Enterprise servers may list files through the PageServices query."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:*:*:*:*:*:*:*:*","matchCriteriaId":"EF437206-7696-4583-A6DC-A622F02001EF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0269","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0269","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0288","sourceIdentifier":"cve@mitre.org","published":"1998-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WINS server in Microsoft Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service (process termination) via invalid UDP frames to port 137 (NETBIOS Name Service), as demonstrated via a flood of random packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"}]}]}],"references":[{"url":"http://safenetworks.com/Windows/wins.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1233","source":"cve@mitre.org"},{"url":"http://safenetworks.com/Windows/wins.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1233","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0333","sourceIdentifier":"cve@mitre.org","published":"1998-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP OpenView Omniback allows remote execution of commands as root via spoofing, and local users can gain root access via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*","matchCriteriaId":"61A4F116-1FEE-450E-99AE-6AD9ACDDE570"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0333","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0333","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0339","sourceIdentifier":"cve@mitre.org","published":"1998-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the libauth library in Solaris allows local users to gain additional privileges, possibly root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0339","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0339","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0344","sourceIdentifier":"cve@mitre.org","published":"1998-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NT users can gain debug-level access on a system process using the Sechole exploit."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D0D4EAC2-A948-461F-B5DD-0AE73CF05D29"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ190288","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-009","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0516","sourceIdentifier":"cve@mitre.org","published":"1998-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An SNMP community name is guessable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0516","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0516","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-243","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-243/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0062","sourceIdentifier":"cve@mitre.org","published":"1998-08-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84"}]}]}],"references":[{"url":"http://www.osvdb.org/7559","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7559","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0262","sourceIdentifier":"cve@mitre.org","published":"1998-08-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hylafax faxsurvey CGI script on Linux allows remote attackers to execute arbitrary commands via shell metacharacters in the query string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:renaud_deraison:faxsurvey:*:*:*:*:*:*:*:*","matchCriteriaId":"1932C5E7-E0B9-4B92-BE56-578A1D7618DE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/2056","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1532","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/2056","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1532","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1199","sourceIdentifier":"cve@mitre.org","published":"1998-08-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Apache WWW server 1.3.1 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via a large number of MIME headers with the same name, aka the \"sioux\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.1","matchCriteriaId":"2CC36A25-1E07-49F0-9725-3F72EAEE6CAF"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90252779826784&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90276683825862&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90280517007869&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90286768232093&w=2","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh51-errata-general.html#apache","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90252779826784&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90276683825862&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90280517007869&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90286768232093&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh51-errata-general.html#apache","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Apache","comment":"Fixed in Apache HTTP Server 1.3.2:\nhttp://httpd.apache.org/security/vulnerabilities_13.html","lastModified":"2008-07-02T00:00:00"}]}},{"cve":{"id":"CVE-1999-0159","sourceIdentifier":"cve@mitre.org","published":"1998-08-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login).  This applies to some IOS 9.x, 10.x, and 11.x releases."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L","baseScore":3.5,"baseSeverity":"LOW","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"LOW"},"exploitabilityScore":2.1,"impactScore":1.4}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-400"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*","matchCriteriaId":"2E9A00D5-A594-4C64-B982-10CB4C554F51"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.0\\(20.3\\):*:*:*:*:*:*:*","matchCriteriaId":"86AFAF8F-B8E2-453B-895C-F94138720745"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*","matchCriteriaId":"841513AE-7521-4670-8438-AE5EB70F3A48"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*","matchCriteriaId":"FF3E8F79-6177-453C-99B5-BC9BC7670869"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*","matchCriteriaId":"4B244655-A6A5-40D0-A0D1-34C814DA9389"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*","matchCriteriaId":"CA064273-1A6E-4303-BAAB-F585691EF9BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*","matchCriteriaId":"0A8158E2-0DFE-479B-B085-9775FF700C85"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*","matchCriteriaId":"29CA3070-B75D-4E56-A338-E10F5509394E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*","matchCriteriaId":"099CFED1-0E2F-46B2-8136-BFA146EB9A00"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*","matchCriteriaId":"047F9781-38B8-488C-B999-A3CA6BDB639C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*","matchCriteriaId":"3E3586C0-64AF-4584-8F56-7E0756B4A521"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*","matchCriteriaId":"9B784C9F-79EE-4D08-9D03-985EC7E378FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*","matchCriteriaId":"FFBA8825-442E-4CAD-A9B2-4DD8546F35F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"2A6F8329-15C7-4FED-A61D-5AF4F3A33976"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*","matchCriteriaId":"CD13732A-DAE0-4D5B-9DAC-6D2CF391220D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*","matchCriteriaId":"A53DE80A-5865-4514-BE14-BA5992EE7BDA"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0159","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0159","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1283","sourceIdentifier":"cve@mitre.org","published":"1998-08-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Opera 3.2.1 allows remote attackers to cause a denial of service (application crash) via a URL that contains an extra / in the http:// tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:opera_software:opera_web_browser:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"11CCD2F1-114C-430E-9D03-55F13017ED38"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/10320","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1541","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10320","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1541","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0157","sourceIdentifier":"cve@mitre.org","published":"1998-08-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco PIX firewall and CBAC IP fragmentation attack results in a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*","matchCriteriaId":"0DC1411B-4E7E-4F57-B025-9FE27B09C7AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*","matchCriteriaId":"655BB9C1-BA90-452E-A9C8-9B1E15B99650"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","matchCriteriaId":"8F86F790-6247-42F2-9487-3D60A2842F52"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*","matchCriteriaId":"CA7F94E8-86FC-456B-A7BB-57953F67F754"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.2\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"B1C4F7D5-DCD0-409C-86BF-A96A5253DF64"}]}]}],"references":[{"url":"http://www.osvdb.org/1097","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1097","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1416","sourceIdentifier":"cve@mitre.org","published":"1998-08-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service (resource exhaustion) via an HTTP POST request with a large content-length."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:inso:dwhttpd:3.1a4:*:*:*:*:*:*:*","matchCriteriaId":"CAF65A00-8271-466F-B6F5-D4E047E5D3C5"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/10383","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/253","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10383","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/253","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1417","sourceIdentifier":"cve@mitre.org","published":"1998-08-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Format string vulnerability in AnswerBook2 (AB2) web server dwhttpd 3.1a4 allows remote attackers to cause a denial of service and possibly execute arbitrary commands via encoded % characters in an HTTP request, which is improperly logged."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:inso:answerbook2:*:*:*:*:*:*:*:*","matchCriteriaId":"9C7095B1-4DC1-4EC9-AA87-79C6D6B8D33C"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/10383","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/253","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10383","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/253","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1041","sourceIdentifier":"cve@mitre.org","published":"1998-08-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in mscreen on SCO OpenServer 5.0 and SCO UNIX 3.2v4 allows a local user to gain root access via (1) a long TERM environmental variable and (2) a long entry in the .mscreenrc file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*","matchCriteriaId":"51756048-EB32-4A72-9ED4-937AF2B9DE37"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90686250717719&w=2","source":"cve@mitre.org"},{"url":"http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/10420","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-98.05a","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90686250717719&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/vendor_bulletins/VB-98.10.sco.mscreen","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/10420","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0065","sourceIdentifier":"cve@mitre.org","published":"1998-08-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple buffer overflows in how dtmail handles attachments allows a remote attacker to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/181","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/181","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0158","sourceIdentifier":"cve@mitre.org","published":"1998-08-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco PIX firewall manager (PFM) on Windows NT allows attackers to connect to port 8080 on the PFM server and retrieve any file whose name and location is known."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.1\\(6\\):*:*:*:*:*:*:*","matchCriteriaId":"1EEDB9DD-C862-4783-9F96-88836424B298"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.2\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"B1C4F7D5-DCD0-409C-86BF-A96A5253DF64"}]}]}],"references":[{"url":"http://www.cisco.com/warp/public/770/pixmgrfile-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/685","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/770/pixmgrfile-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/685","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0162","sourceIdentifier":"cve@mitre.org","published":"1998-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The \"established\" keyword in some Cisco IOS software allowed an attacker to bypass filtering."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*","matchCriteriaId":"E8026B11-6144-467F-8094-F4F73CD37526"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0162","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0162","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0302","sourceIdentifier":"cve@mitre.org","published":"1998-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SunOS/Solaris FTP clients can be forced to execute arbitrary commands from a malicious FTP server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/176","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/176","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0310","sourceIdentifier":"cve@mitre.org","published":"1998-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SSH 1.2.25 on HP-UX allows access to new user accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*","matchCriteriaId":"7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0310","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0792","sourceIdentifier":"cve@mitre.org","published":"1998-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ROUTERmate has a default SNMP community name which allows remote attackers to modify its configuration."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:osicom:routermate:*:*:*:*:*:*:*:*","matchCriteriaId":"6D8B423C-70E4-4569-A824-5AFEB4831E6D"}]}]}],"references":[{"url":"http://www2.merton.ox.ac.uk/~security/rootshell/0022.html","source":"cve@mitre.org"},{"url":"http://www2.merton.ox.ac.uk/~security/rootshell/0022.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1292","sourceIdentifier":"cve@mitre.org","published":"1998-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in web administration feature of Kolban Webcam32 4.8.3 and earlier allows remote attackers to execute arbitrary commands via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kolban:webcam32:*:*:*:*:*:*:*:*","versionEndIncluding":"4.8.3","matchCriteriaId":"4D108406-E89B-40FF-B6BD-619F75EB17F7"}]}]}],"references":[{"url":"http://xforce.iss.net/alerts/advise7.php","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1366","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/alerts/advise7.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1366","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0779","sourceIdentifier":"cve@mitre.org","published":"1998-09-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in HP-UX SharedX recserv program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9810-086","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9810-086","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0930","sourceIdentifier":"cve@mitre.org","published":"1998-09-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wwwboard allows a remote attacker to delete message board articles via a malformed argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:wwwboard:*:*:*:*:*:*:*:*","matchCriteriaId":"5C21AAC7-45B9-4A4D-8905-86827353D8E7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1795","source":"cve@mitre.org"},{"url":"http://www.worldwidemart.com/scripts/faq/wwwboard/q5.shtml","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2344","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1795","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.worldwidemart.com/scripts/faq/wwwboard/q5.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2344","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0871","sourceIdentifier":"cve@mitre.org","published":"1998-09-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.0 and 4.01 allow a remote attacker to read files via IE's cross frame security, aka the \"Cross Frame Navigate\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"}]}]}],"references":[{"url":"http://www.osvdb.org/7837","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-013","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3668","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7837","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-013","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3668","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1048","sourceIdentifier":"cve@mitre.org","published":"1998-09-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in bash 2.0.0, 1.4.17, and other versions allows local attackers to gain privileges by creating an extremely large directory name, which is inserted into the password prompt via the \\w option in the PS1 environmental variable when another user changes into that directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"7A632089-47D7-410D-AE12-F801193FA18F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602746719555&w=2","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/1998/19980909","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/8345","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10542","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3414","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602746719555&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/1998/19980909","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/8345","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/10542","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3414","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0056","sourceIdentifier":"cve@mitre.org","published":"1998-09-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Sun's ping program can give root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/174","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/174","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0897","sourceIdentifier":"cve@mitre.org","published":"1998-09-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"iChat ROOMS Webserver allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:ichat_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"8CCBB619-E376-47B7-8445-8AE61C458C8D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90538488231977&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90538488231977&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1020","sourceIdentifier":"cve@mitre.org","published":"1998-09-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation of Novell Netware NDS 5.99 provides an unauthenticated client with Read access for the tree, which allows remote attackers to access sensitive information such as users, groups, and readable objects via CX.EXE and NLIST.EXE."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.1:*:*:*:*:*:*:*","matchCriteriaId":"01439E99-85F3-47B6-802A-909B737071D2"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.11:sp5b:*:*:*:*:*:*","matchCriteriaId":"063118A6-F4AA-4D3C-865C-DCD0F3623EF2"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90613355902262&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/484","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1364","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90613355902262&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/484","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1364","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1265","sourceIdentifier":"cve@mitre.org","published":"1998-09-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SMTP server in SLmail 3.1 and earlier allows remote attackers to cause a denial of service via malformed commands whose arguments begin with a \"(\" (parenthesis) character, such as (1) SEND, (2) VRFY, (3) EXPN, (4) MAIL FROM, (5) RCPT TO."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seatle_lab_software:slmail:*:*:*:*:*:*:*:*","versionEndIncluding":"3.1","matchCriteriaId":"84FADB0F-FD14-45BC-A44E-53AE30730E36"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90649892424117&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=90650438826447&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1664","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90649892424117&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=90650438826447&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1664","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1054","sourceIdentifier":"cve@mitre.org","published":"1998-09-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of FLEXlm license manager 6.0d, and possibly other versions, allows remote attackers to shut down the server via the lmdown command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:globetrotter:flexlm:6.0d:*:*:*:*:*:*:*","matchCriteriaId":"1613C444-1046-40F1-B6E8-B6F89E487B12"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90675672323825&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90675672323825&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1228","sourceIdentifier":"cve@mitre.org","published":"1998-09-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Various modems that do not implement a guard time, or are configured with a guard time of 0, can allow remote attackers to execute arbitrary modem commands such as ATH, ATH0, etc., via a \"+++\" sequence that appears in ICMP packets, the subject of an e-mail message, IRC commands, and others."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:logicode:quicktel:28.8:*:*:*:*:*:*:*","matchCriteriaId":"B177A271-09B3-48BC-B5D1-E1E17427813D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:diamond:supra:33.6:*:*:*:*:*:*:*","matchCriteriaId":"03638F27-02F0-4438-83B2-3D489090F35D"},{"vulnerable":true,"criteria":"cpe:2.3:h:diamond:supra:v.90:*:*:*:*:*:*:*","matchCriteriaId":"1CA4A31C-2DA6-4E0D-AA9C-73FB707ABCAE"},{"vulnerable":true,"criteria":"cpe:2.3:h:us_robotics:us_robotics:33.6:*:*:*:*:*:*:*","matchCriteriaId":"1D89043A-7602-452F-BF33-2A8E85D6BF9A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90695973308453&w=2","source":"cve@mitre.org"},{"url":"http://www.macintouch.com/modemsecurity.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3320","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90695973308453&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.macintouch.com/modemsecurity.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3320","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0969","sourceIdentifier":"cve@mitre.org","published":"1998-09-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows NT RPC service allows remote attackers to conduct a denial of service using spoofed malformed RPC packets which generate an error message that is sent to the spoofed host, potentially setting up a loop, aka Snork."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ193233","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-014","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ193233","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-014","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1181","sourceIdentifier":"cve@mitre.org","published":"1998-09-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in On-Line Customer Registration software for IRIX 6.2 through 6.4 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"6.4","matchCriteriaId":"BD2D5C10-ED78-4A1C-B0D1-68F34EAD2614"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980901-01-PX","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-003.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7441.php","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19980901-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-003.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7441.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0186","sourceIdentifier":"cve@mitre.org","published":"1998-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Solaris, an SNMP subagent has a default community string that allows remote attackers to execute arbitrary commands as root, or modify system parameters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"}]}]}],"references":[{"url":"http://support.novell.com/cgi-bin/search/searchtid.cgi?/10080762.htm","source":"cve@mitre.org"},{"url":"http://support.novell.com/cgi-bin/search/searchtid.cgi?/10080762.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-238/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0505","sourceIdentifier":"cve@mitre.org","published":"1998-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT domain user or administrator account has a guessable password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0505","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0505","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0506","sourceIdentifier":"cve@mitre.org","published":"1998-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT domain user or administrator account has a default, null, blank, or missing password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0506","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0506","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0546","sourceIdentifier":"cve@mitre.org","published":"1998-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows NT guest account is enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0546","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0546","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0870","sourceIdentifier":"cve@mitre.org","published":"1998-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.01 allows remote attackers to read arbitrary files by pasting a file name into the file upload control, aka untrusted scripted paste."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp1:*:*:*:*:*:*","matchCriteriaId":"0AF9C64F-9A67-4BA9-A653-75507935E6EA"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-015","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-015","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0343","sourceIdentifier":"cve@mitre.org","published":"1998-10-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A malicious Palace server can force a client to execute arbitrary programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:palace:palace_client:*:*:*:*:*:*:*:*","matchCriteriaId":"26E30443-D298-43AF-9C40-397BF6F5386D"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0343","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0343","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1403","sourceIdentifier":"cve@mitre.org","published":"1998-10-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM/Tivoli OPC Tracker Agent version 2 release 1 creates files, directories, and IPC message queues with insecure permissions (world-readable and world-writable), which could allow local users to disrupt operations and possibly gain privileges by modifying or deleting files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:1.0x:*:*:*:*:*:*:*","matchCriteriaId":"2DE3B09E-766A-42B1-BCA9-894CC99F8DFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:2.0x:*:*:*:*:*:*:*","matchCriteriaId":"A42A16FE-C968-4A27-A094-64DD31085C15"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:3.0x:*:*:*:*:*:*:*","matchCriteriaId":"4E77F32E-40E7-4766-B127-4C1F8DE89339"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/10771","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/382","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10771","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/382","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1404","sourceIdentifier":"cve@mitre.org","published":"1998-10-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM/Tivoli OPC Tracker Agent version 2 release 1 allows remote attackers to cause a denial of service (resource exhaustion) via malformed data to the localtracker client port (5011), which prevents the connection from being closed properly."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:1.0x:*:*:*:*:*:*:*","matchCriteriaId":"2DE3B09E-766A-42B1-BCA9-894CC99F8DFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:2.0x:*:*:*:*:*:*:*","matchCriteriaId":"A42A16FE-C968-4A27-A094-64DD31085C15"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:tivoli_opc_tracker_agent:3.0x:*:*:*:*:*:*:*","matchCriteriaId":"4E77F32E-40E7-4766-B127-4C1F8DE89339"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/10771","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/382","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10771","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/382","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1291","sourceIdentifier":"cve@mitre.org","published":"1998-10-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TCP/IP implementation in Microsoft Windows 95, Windows NT 4.0, and possibly others, allows remote attackers to reset connections by forcing a reset (RST) via a PSH ACK or other means, obtaining the target's last sequence number from the resulting packet, then spoofing a reset to the target."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/10789","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1383","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10789","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1383","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1185","sourceIdentifier":"cve@mitre.org","published":"1998-10-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SCO mscreen allows local users to gain root privileges via a long terminal entry (TERM) in the .mscreenrc file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sco:cmw:3.0:*:*:*:*:*:*:*","matchCriteriaId":"C28F3AC9-EC84-402B-987D-9F8891B81906"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:all_versions:*:*:*:*:*:*:*","matchCriteriaId":"BB2712AB-ABFB-4EEC-B07A-31B4025E8FEE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*","matchCriteriaId":"0AD2701A-E930-4F4D-85F7-02F80135E34E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7363FF35-7C67-40DC-AD38-74FD6264BF5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver_enterprise_system:5.0.4p:*:*:*:*:*:*:*","matchCriteriaId":"77B0A8C5-DAE1-468C-B8EC-05CF40C78695"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90686250717719&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1379","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90686250717719&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1379","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1381","sourceIdentifier":"cve@mitre.org","published":"1998-10-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in dbadmin CGI program 1.0.1 on Linux allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dbadmin:dbadmin:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1DC1B27B-AE89-4A67-97EE-4FAE5BBF1BFE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90786656409618&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90786656409618&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0002","sourceIdentifier":"cve@mitre.org","published":"1998-10-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NFS mountd gives root access to remote attackers, mostly in Linux systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:1.1:*:*:*:*:*:*:*","matchCriteriaId":"2F5E922C-239D-4F98-87ED-BB7998BE99C5"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"A5C77FA7-C977-4223-B6AC-91B82C45129C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"5302613E-F0DD-4B46-884C-49A977FD4147"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"674066BB-2576-4AAE-B97F-A4470815F1AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"445EECD3-2DB9-43D1-B26F-0979A3C02D45"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981006-01-I","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-006.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/121","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981006-01-I","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-006.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/121","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0053","sourceIdentifier":"cve@mitre.org","published":"1998-10-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TCP RST denial of service in FreeBSD."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"}]}]}],"references":[{"url":"http://www.osvdb.org/6094","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6094","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0088","sourceIdentifier":"cve@mitre.org","published":"1998-10-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IRIX and AIX automountd services (autofsd) allow remote users to execute root commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://www-1.ibm.com/services/brs/brspwhub.nsf/advisories/852567CC004F9038852566BF007B6393/%24file/ERS-SVA-E01-1998_004_1.txt","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/services/brs/brspwhub.nsf/advisories/852567CC004F9038852566BF007B6393/%24file/ERS-SVA-E01-1998_004_1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0215","sourceIdentifier":"cve@mitre.org","published":"1998-10-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Routed allows attackers to append data to files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:3:*:*:*:*:*:*:*","matchCriteriaId":"FE9504A8-CCF7-4A7E-B85F-F5801E9BCA0E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:4:*:*:*:*:*:*:*","matchCriteriaId":"C6AACDE0-00BA-4A29-8305-5AA0A4BC273C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*","matchCriteriaId":"7A870F95-DB46-4069-82B3-819E2B690C61"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981004-01-PX","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-012.shtml","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981004-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-012.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0118","sourceIdentifier":"cve@mitre.org","published":"1998-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX infod allows local users to gain root access through an X display."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91158980826979&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91158980826979&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0254","sourceIdentifier":"cve@mitre.org","published":"1998-11-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A hidden SNMP community string in HP OpenView allows remote attackers to modify MIB tables and obtain sensitive information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0254","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0254","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-239","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-239/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1459","sourceIdentifier":"cve@mitre.org","published":"1998-11-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BMC PATROL Agent before 3.2.07 allows local users to gain root privileges via a symlink attack on a temporary file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD670201-A070-4E0D-BE58-2329116681AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"6C07DD3D-C806-4218-BBC8-B859940D9330"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/534","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://xforce.iss.net/alerts/advise10.php","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1388","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/534","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://xforce.iss.net/alerts/advise10.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1388","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0052","sourceIdentifier":"cve@mitre.org","published":"1998-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IP fragmentation denial of service in FreeBSD allows a remote attacker to cause a crash."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-476"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:4.0:*:*:*:*:*:*:*","matchCriteriaId":"7ECF99E9-1C3B-4D8F-A52E-28D0BFEB2E9D"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","matchCriteriaId":"BF8F9B2F-E898-4F87-A245-32A41748587B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","matchCriteriaId":"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"1FC373FC-88AC-4B6D-A289-51881ACD57F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"}]}]}],"references":[{"url":"http://www.osvdb.org/908","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1389","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/908","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1389","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1284","sourceIdentifier":"cve@mitre.org","published":"1998-11-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NukeNabber allows remote attackers to cause a denial of service by connecting to the NukeNabber port (1080) without sending any data, which causes the CPU usage to rise to 100% from the report.exe program that is executed upon the connection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:puppets_place:nukenabber:*:*:*:*:*:*:*:*","matchCriteriaId":"8D32C111-52DD-4467-A379-DBAD14463954"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91063407332594&w=2","source":"cve@mitre.org"},{"url":"http://www.dynamsol.com/puppet/text/new.txt","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/archive/1/11131","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1540","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91063407332594&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.dynamsol.com/puppet/text/new.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/archive/1/11131","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1540","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1321","sourceIdentifier":"cve@mitre.org","published":"1998-11-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ssh 1.2.26 client with Kerberos V enabled could allow remote attackers to cause a denial of service or execute arbitrary commands via a long DNS hostname that is not properly handled during TGT ticket passing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos:v:*:*:*:*:*:*:*","matchCriteriaId":"0DB38284-7E3B-4D2C-A147-D9B3898E31A0"}]}]}],"references":[{"url":"http://lists.netspace.org/cgi-bin/wa?A2=ind9811A&L=bugtraq&P=R4814","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4883","source":"cve@mitre.org"},{"url":"http://lists.netspace.org/cgi-bin/wa?A2=ind9811A&L=bugtraq&P=R4814","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4883","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1153","sourceIdentifier":"cve@mitre.org","published":"1998-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HAMcards Postcard CGI script 1.0 allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hamcards_postcard_cgi:hamcards_postcard_cgi:1.0:*:*:*:*:*:*:*","matchCriteriaId":"1BA3A1FF-5CFD-464B-95B8-612B51E8F63A"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/11175","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1400","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/11175","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1400","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1154","sourceIdentifier":"cve@mitre.org","published":"1998-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"LakeWeb Filemail CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lakeweb:filemail_cgi_script:*:*:*:*:*:*:*:*","matchCriteriaId":"22EABBF1-6D2F-4166-B8D9-D845C5AE0BEB"}]}]}],"references":[{"url":"http://lakeweb.com/scripts/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/11175","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1400","source":"cve@mitre.org"},{"url":"http://lakeweb.com/scripts/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/11175","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1400","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1155","sourceIdentifier":"cve@mitre.org","published":"1998-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"LakeWeb Mail List CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the recipient email address."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lakeweb:mail_list_cgi_script:*:*:*:*:*:*:*:*","matchCriteriaId":"75701CE6-3747-40B8-972C-2EE39E25E856"}]}]}],"references":[{"url":"http://lakeweb.com/scripts/","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/11175","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1400","source":"cve@mitre.org"},{"url":"http://lakeweb.com/scripts/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/11175","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1400","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1289","sourceIdentifier":"cve@mitre.org","published":"1998-11-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ICQ 98 beta on Windows NT leaks the internal IP address of a client in the TCP data segment of an ICQ packet instead of the public address (e.g. through NAT), which provides remote attackers with potentially sensitive information about the client or the internal network configuration."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:98_beta:*:*:*:*:*:*:*","matchCriteriaId":"FD1BC08E-A587-421D-9B79-1ED40AD54699"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/11233","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1398","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/11233","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1398","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1025","sourceIdentifier":"cve@mitre.org","published":"1998-11-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CDE screen lock program (screenlock) on Solaris 2.6 does not properly lock an unprivileged user's console session when the host is an NIS+ client, which allows others with physical access to login with any string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*","matchCriteriaId":"C1A13A9E-E24A-4AEE-AD42-2BCA5990E4B9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90831127921062&w=2","source":"cve@mitre.org"},{"url":"http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fpatches%2F106027&zone_32=411568%2A%20","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/294","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=90831127921062&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?doc=fpatches%2F106027&zone_32=411568%2A%20","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/294","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1322","sourceIdentifier":"cve@mitre.org","published":"1998-11-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:arcserve_backup:*:*:*:*:*:*:*:*","matchCriteriaId":"1DC5F560-7B2E-426E-AC3B-EB4CE16DCE02"},{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:inoculan:*:*:*:*:*:*:*:*","matchCriteriaId":"55A180FA-9D61-44C5-B174-75DBAB2074ED"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:*:*:*:*:*:*:*:*","matchCriteriaId":"261FB692-DD0F-494F-A25A-AFCC00BE4585"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=91096758513985&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91133714919229&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91096758513985&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=91133714919229&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0057","sourceIdentifier":"cve@mitre.org","published":"1998-11-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vacation program allows command execution by remote users through a sendmail command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:vacation:*:*:*:*:*:*:*:*","matchCriteriaId":"F37FF4C2-CCFE-4B9A-A814-B0F7AD6E012E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*","matchCriteriaId":"066D4E93-366F-42D4-B27D-8AF981F5F2AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:vvos:*:*:*:*:*:*:*:*","matchCriteriaId":"7AADED85-FA20-4D93-8921-A4933181ADF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:*:*:*:*:*:*:*:*","matchCriteriaId":"F7F01A55-7C37-4BAF-A4D4-61E8AC54FF79"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*","matchCriteriaId":"469B74F2-4B89-42B8-8638-731E92D463B9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","matchCriteriaId":"11AEFEC9-5DB4-44CB-977D-6561DC1680C1"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9811-087","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9811-087","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0780","sourceIdentifier":"cve@mitre.org","published":"1998-11-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KDE klock allows local users to kill arbitrary processes by specifying an arbitrary PID in the .kss.pid file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.0:*:*:*:*:*:*:*","matchCriteriaId":"30661C23-9BE4-4F6E-AEB9-1B9D7DAA6FC9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0781","sourceIdentifier":"cve@mitre.org","published":"1998-11-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KDE allows local users to execute arbitrary commands by setting the KDEDIR environmental variable to modify the search path that KDE uses to locate its executables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.0:*:*:*:*:*:*:*","matchCriteriaId":"30661C23-9BE4-4F6E-AEB9-1B9D7DAA6FC9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0782","sourceIdentifier":"cve@mitre.org","published":"1998-11-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KDE kppp allows local users to create a directory in an arbitrary location via the HOME environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.0:*:*:*:*:*:*:*","matchCriteriaId":"30661C23-9BE4-4F6E-AEB9-1B9D7DAA6FC9"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1107","sourceIdentifier":"cve@mitre.org","published":"1998-11-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in kppp in KDE allows local users to gain root access via a long PATH environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.0:*:*:*:*:*:*:*","matchCriteriaId":"30661C23-9BE4-4F6E-AEB9-1B9D7DAA6FC9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1650","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91141486301691&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1650","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1108","sourceIdentifier":"cve@mitre.org","published":"1998-11-18T05:00:00.000","lastModified":"2023-11-07T01:55:06.680","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-1107.  Reason: This candidate is a duplicate of CVE-1999-1107.  Notes: All CVE users should reference CVE-1999-1107 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-1288","sourceIdentifier":"cve@mitre.org","published":"1998-11-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Samba 1.9.18 inadvertently includes a prototype application, wsmbconf, which is installed with incorrect permissions including the setgid bit, which allows local users to read and write files and possibly gain privileges via bugs in the program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:samba:samba:1.9.18:*:*:*:*:*:*:*","matchCriteriaId":"EF3C20A1-F21D-41FF-8B87-B50E1AE8219E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.1:*:*:*:*:*:*:*","matchCriteriaId":"F8A9DB15-1F04-4864-A8AD-FCCB35A63B2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"A5C77FA7-C977-4223-B6AC-91B82C45129C"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"EED21F27-4ADA-42AC-B28E-F849F47D4043"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"B133DAC8-2B0D-4F83-9025-AD071740187A"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:*:*:*:*:*:*:*:*","matchCriteriaId":"6A03039A-881A-44C6-B69E-0BDC7914216F"}]}]}],"references":[{"url":"http://www.caldera.com/support/security/advisories/SA-1998.35.txt","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/11397","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1406","source":"cve@mitre.org"},{"url":"http://www.caldera.com/support/security/advisories/SA-1998.35.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/11397","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1406","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1411","sourceIdentifier":"cve@mitre.org","published":"1998-11-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation of the fsp package 2.71-10 in Debian GNU/Linux 2.0 adds the anonymous FTP user without notifying the administrator, which could automatically enable anonymous FTP on some servers such as wu-ftp."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"}]}]}],"references":[{"url":"http://lists.debian.org/debian-security-announce/debian-security-announce-1998/msg00033.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91228908407679&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91244712808780&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91936850009861&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7574.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/316","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://lists.debian.org/debian-security-announce/debian-security-announce-1998/msg00033.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91228908407679&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91244712808780&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91936850009861&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7574.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/316","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1071","sourceIdentifier":"cve@mitre.org","published":"1998-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Excite for Web Servers (EWS) 1.1 installs the Architext.conf authentication file with world-writeable permissions, which allows local users to gain access to Excite accounts by modifying the file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:excite:ews:1.1:*:*:*:*:*:*:*","matchCriteriaId":"5F69DC10-474D-44C8-BE36-7F77EFBB0955"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91248445931140&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1417","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91248445931140&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1417","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1072","sourceIdentifier":"cve@mitre.org","published":"1998-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Excite for Web Servers (EWS) 1.1 allows local users to gain privileges by obtaining the encrypted password from the world-readable Architext.conf authentication file and replaying the encrypted password in an HTTP request to AT-generated.cgi or AT-admin.cgi."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:excite:ews:1.1:*:*:*:*:*:*:*","matchCriteriaId":"5F69DC10-474D-44C8-BE36-7F77EFBB0955"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91248445931140&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91248445931140&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1073","sourceIdentifier":"cve@mitre.org","published":"1998-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Excite for Web Servers (EWS) 1.1 records the first two characters of a plaintext password in the beginning of the encrypted password, which makes it easier for an attacker to guess passwords via a brute force or dictionary attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:excite:ews:1.1:*:*:*:*:*:*:*","matchCriteriaId":"5F69DC10-474D-44C8-BE36-7F77EFBB0955"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91248445931140&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91248445931140&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0321","sourceIdentifier":"cve@mitre.org","published":"1998-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris kcms_configure command allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*","matchCriteriaId":"469B74F2-4B89-42B8-8638-731E92D463B9"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0321","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0321","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0332","sourceIdentifier":"cve@mitre.org","published":"1998-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NetMeeting allows denial of service and remote command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:netmeeting:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3029C5D3-431E-4EBB-9D54-C9FDA557797B"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ184346","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ184346","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0342","sourceIdentifier":"cve@mitre.org","published":"1998-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux PAM modules allow local users to gain root access using temporary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pam:pam:*:*:*:*:*:*:*:*","versionEndIncluding":"0.64","matchCriteriaId":"FB26C1A0-AC69-429D-998A-EFC193ECC7B0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0342","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0342","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0385","sourceIdentifier":"cve@mitre.org","published":"1998-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The LDAP bind function in Exchange 5.5 has a buffer overflow that allows a remote attacker to conduct a denial of service or execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*","matchCriteriaId":"B4F9C143-4734-4E5D-9281-F51513C5CAAF"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-009","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-009","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0463","sourceIdentifier":"cve@mitre.org","published":"1998-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can perform a denial of service using IRIX fcagent."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*","matchCriteriaId":"BFA5C409-12E4-47B8-B0E2-A11EE687EE4A"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981201-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19981201-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0478","sourceIdentifier":"cve@mitre.org","published":"1998-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in HP-UX sendmail 8.8.6 related to accepting connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*","versionEndIncluding":"8.9.2","matchCriteriaId":"B32D2CFE-A6E7-43DB-8150-E0547C6FE6D5"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9904-097","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9904-097","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0869","sourceIdentifier":"cve@mitre.org","published":"1998-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 3.x to 4.01 allows a remote attacker to insert malicious content into a frame of another web site, aka frame spoofing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBF9241-A175-438C-A793-3D245BE2AE35"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"F62AC866-A06F-47DB-AEDF-E345CE0B14A4"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"943D5C5C-FC49-4EDE-AE75-A79CFF42208E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.2:*:*:*:*:*:*:*","matchCriteriaId":"8873A08F-D4C7-46FC-8FE5-972644F85ADA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:*:*:*:*:*:*:*:*","matchCriteriaId":"DA2CA2F8-260C-4559-BF24-3E321CEAE93F"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-020","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-020","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0836","sourceIdentifier":"cve@mitre.org","published":"1998-12-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UnixWare uidadmin allows local users to modify arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.22a","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/842","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991202160111.20553.qmail%40nwcst282.netaddress.usa.net","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.22a","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/842","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991202160111.20553.qmail%40nwcst282.netaddress.usa.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0936","sourceIdentifier":"cve@mitre.org","published":"1998-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BNBSurvey survey.cgi program allows remote attackers to execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0936","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0936","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0937","sourceIdentifier":"cve@mitre.org","published":"1998-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BNBForm allows remote attackers to read arbitrary files via the automessage hidden form variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0937","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0937","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1280","sourceIdentifier":"cve@mitre.org","published":"1998-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hummingbird Exceed 6.0.1.0 inadvertently includes a DLL that was meant for development and testing, which logs user names and passwords in cleartext in the test.log file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hummingbird:exceed:6.0.1.0:*:*:*:*:*:*:*","matchCriteriaId":"E8E15EF3-8EB4-4D1A-B831-3CEE8A4B14FD"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/11512","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1547","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/11512","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1547","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0798","sourceIdentifier":"cve@mitre.org","published":"1998-12-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in bootpd on OpenBSD, FreeBSD, and Linux systems via a malformed header type."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7932DF-A035-4506-9BF1-C733DC5DD872"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*","matchCriteriaId":"32FCB0B3-8FBE-49FA-B17E-0D5462C9E5B4"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"B133DAC8-2B0D-4F83-9025-AD071740187A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:internet_faststart:*:*:*:*:*:*:*:*","matchCriteriaId":"9E88B374-7D32-467D-9A5B-3011897F844C"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:*:*:*:*:*:*:*:*","matchCriteriaId":"B5F14C63-9596-4675-B217-F22F8A18CD1B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91278867118128&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91278867118128&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1147","sourceIdentifier":"cve@mitre.org","published":"1998-12-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Platinum Policy Compliance Manager (PCM) 7.0 allows remote attackers to execute arbitrary commands via a long string to the Agent port (1827), which is handled by smaxagent.exe."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:platinum:policy_compliance_manager:7.0:*:*:*:*:*:*:*","matchCriteriaId":"EB43F151-1FDF-42BE-8785-3DFF6D4AA819"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91273739726314&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3164","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1430","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91273739726314&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3164","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1430","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1276","sourceIdentifier":"cve@mitre.org","published":"1998-12-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"fte-console in the fte package before 0.46b-4.1 does not drop root privileges, which allows local users to gain root access via the virtual console device."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"http://www.debian.org/security/1998/19981207","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1609","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/1998/19981207","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1609","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1282","sourceIdentifier":"cve@mitre.org","published":"1998-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RealSystem G2 server stores the administrator password in cleartext in a world-readable configuration file, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realsystem_g2_server:*:*:*:*:*:*:*:*","matchCriteriaId":"E855DA0F-BC37-4FBF-80C9-0F84FC8ED26D"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/11543","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1542","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/11543","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1542","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0139","sourceIdentifier":"cve@mitre.org","published":"1998-12-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"}]}]}],"references":[{"url":"http://www.osvdb.org/8205","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8205","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0188","sourceIdentifier":"cve@mitre.org","published":"1998-12-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The passwd command in Solaris can be subjected to a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/182","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/182","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1173","sourceIdentifier":"cve@mitre.org","published":"1998-12-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Corel Word Perfect 8 for Linux creates a temporary working directory with world-writable permissions, which allows local users to (1) modify Word Perfect behavior by modifying files in the working directory, or (2) modify files of other users via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:corel:wordperfect:8:*:linux:*:*:*:*:*","matchCriteriaId":"3D332FC0-CDDD-4BB6-A4D5-B2A2392F791F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91404045014047&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91404045014047&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1277","sourceIdentifier":"cve@mitre.org","published":"1998-12-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BackWeb client stores the username and password in cleartext for proxy authentication in the Communication registry key, which could allow other local users to gain privileges by reading the password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:backweb_technologies:backweb_client:*:*:*:*:*:*:*:*","matchCriteriaId":"379ED4B7-2E58-4BF3-A5C8-3DED7A2BC739"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=91487886514546&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1565","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91487886514546&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1565","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1278","sourceIdentifier":"cve@mitre.org","published":"1998-12-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"nlog CGI scripts do not properly filter shell metacharacters from the IP address argument, which could allow remote attackers to execute certain commands via (1) nlog-smb.pl or (2) rpc-nlog.pl."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nlog:nlog:*:*:*:*:*:*:*:*","matchCriteriaId":"24DC9CD3-1F29-425F-9207-0892C55DA9D5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91470326629357&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91471400632145&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1549","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1550","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91470326629357&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91471400632145&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1549","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1550","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0968","sourceIdentifier":"cve@mitre.org","published":"1998-12-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in BNC IRC proxy allows remote attackers to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:james_seter:bnc_irc:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.4","matchCriteriaId":"D1BD1CEE-FC91-48B1-8180-FFD550382353"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/11711","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1927","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1546","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/11711","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1927","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1546","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1281","sourceIdentifier":"cve@mitre.org","published":"1998-12-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Development version of Breeze Network Server allows remote attackers to cause the system to reboot by accessing the configbreeze CGI program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:winddance_networks_corporation:breeze_network_server:*:*:*:*:*:*:*:*","matchCriteriaId":"2215497A-E303-405D-B9C2-E6CFBFC388F8"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/11720","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1544","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/11720","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1544","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1188","sourceIdentifier":"cve@mitre.org","published":"1998-12-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"mysqld in MySQL 3.21 creates log files with world-readable permissions, which allows local users to obtain passwords for users who are added to the user database."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.21:*:*:*:*:*:*:*","matchCriteriaId":"B82E464F-3871-40C7-A758-B81582D193AE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91479159617803&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1568","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91479159617803&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1568","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1285","sourceIdentifier":"cve@mitre.org","published":"1998-12-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux 2.1.132 and earlier allows local users to cause a denial of service (resource exhaustion) by reading a large buffer from a random device (e.g. /dev/urandom), which cannot be interrupted until the read has completed."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1.132","matchCriteriaId":"C8F50E78-7DEC-44B7-A07B-EAFDBF060CBC"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91495921611500&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91495921611500&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1472","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1159","sourceIdentifier":"cve@mitre.org","published":"1998-12-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SSH 2.0.11 and earlier allows local users to request remote forwarding from privileged ports without being root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"B7735CDD-8BFC-4E30-9C88-27C8943637CA"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91495920911490&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1471","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91495920911490&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1471","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0020","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:53.530","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-0032.  Reason: This candidate is a duplicate of CVE-1999-0032.  Notes: All CVE users should reference CVE-1999-0032 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-0110","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:55.093","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-0315.  Reason: This candidate's original description had a typo that delayed it from being detected as a duplicate of CVE-1999-0315.  Notes: All CVE users should reference CVE-1999-0315 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-0187","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:55.743","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: CVE-1999-0022.  Reason: This candidate is a duplicate of CVE-1999-0022.  Notes: All CVE users should reference CVE-1999-0022 instead of this candidate.  All references and descriptions in this candidate have been removed to prevent accidental usage"}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-0197","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"finger 0@host on some systems may print information on some user accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8378","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8378","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0198","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"finger .@host on some systems may print information on some user accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8378","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8378","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0200","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT FTP server (WFTP) with the guest account enabled without a password allows an attacker to log into the FTP server using any username and password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=137853","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=137853","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0205","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Sendmail 8.6.11 and 8.6.12."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.6.11:*:*:*:*:*:*:*","matchCriteriaId":"7A7D2130-328B-4D1D-A4D5-F4F9610660FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.6.12:*:*:*:*:*:*:*","matchCriteriaId":"CDC370E2-6F73-4B80-BBDD-C338E155F502"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0205","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0205","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0220","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Attackers can do a denial of service of IRC by crashing the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0220","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0220","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0226","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT TCP/IP processes fragmented IP packets improperly, causing a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-19"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:-:*:*:*:*:*:*:*","matchCriteriaId":"46E2D695-54F5-4D3E-B1F8-CABE51AE6064"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0226","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0226","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0231","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in IP-Switch IMail and Seattle Labs Slmail 2.6 packages using a long VRFY command, causing a denial of service and possibly remote access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seattle_lab_software:slmail:2.6:*:*:*:*:*:*:*","matchCriteriaId":"0EB72547-C2E9-43EA-B81A-DFD6F4829103"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0231","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0231","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0240","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Some filters or firewalls allow fragmented SYN packets with IP reserved bits in violation of their implemented policy."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0240","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0240","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0243","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux cfingerd could be exploited to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.geocrawler.com/archives/3/92/1996/9/0/2217716/","source":"cve@mitre.org"},{"url":"http://www.geocrawler.com/archives/3/92/1996/9/0/2217716/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0248","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition in the authentication agent mechanism of sshd 1.2.17 allows an attacker to steal another user's credentials."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"338EDA76-05D6-48C0-952E-6244A5F206F3"}]}]}],"references":[{"url":"http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html","source":"cve@mitre.org"},{"url":"http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1","source":"cve@mitre.org"},{"url":"http://oliver.efri.hr/~crv/security/bugs/mUNIXes/ssh2.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.uni-karlsruhe.de/~ig25/ssh-faq/ssh-faq-6.html#ss6.1","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0255","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ircd allows arbitrary command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0255","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0255","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0268","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MetaInfo MetaWeb web server allows users to upload, execute, and read scripts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:metainfo:metaweb:*:*:*:*:*:*:*:*","matchCriteriaId":"96ACD6E6-6B26-4B24-85B0-1452BD24DB0F"}]}]}],"references":[{"url":"http://www.osvdb.org/110","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3969","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/110","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3969","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0276","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"mSQL v2.0.1 and below allows remote execution through a buffer overflow."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hughes:msql:2.0.:*:*:*:*:*:*:*","matchCriteriaId":"80EB7396-8E0E-42FE-9C00-5B1666E024B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:hughes:msql:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"1D9A90C0-DF6F-44A7-B758-DB209D1F526E"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0276","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0276","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0283","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Java Web Server would allow remote users to obtain the source code for CGI programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88256790401004&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88256790401004&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0285","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in telnet from the Windows NT Resource Kit, by opening then immediately closing a connection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0285","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0285","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0286","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In some NT web servers, appending a space at the end of a URL may allow attackers to read source code for active pages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0286","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0286","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0355","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local or remote users can force ControlIT 4.5 to reboot or force a user to log out, resulting in a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:controlit:4.5:*:*:*:*:*:*:*","matchCriteriaId":"5EA099EC-3A4F-4F25-BDE2-7590DC2E0233"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0355","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0355","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0361","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetWare version of LaserFiche stores usernames and passwords unencrypted, and allows administrative changes without logging."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0361","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0361","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0364","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Access 97 stores a database password as plaintext in a foreign mdb, allowing access to data."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fms_inc.:total_vb_sourcebook:6.0:*:*:*:*:*:*:*","matchCriteriaId":"95B0AEB7-A2C2-4C4D-88F7-AACF456965F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:access:97:*:*:*:*:*:*:*","matchCriteriaId":"561C0480-2B14-43E0-B187-06092D9A2D83"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91816470220259&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91816470220259&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0384","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:98:*:mac:*:*:*:*:*","matchCriteriaId":"36227AF5-8A53-41E3-88E3-5978C22BBAB2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*","matchCriteriaId":"52970A43-173E-477B-80BF-6FDBB6B0EECD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:98:*:*:*:*:*:*:*","matchCriteriaId":"77BFDC2A-4AE1-4FC8-ABA7-0400D46EA587"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_basic:5.0:*:*:*:*:*:*:*","matchCriteriaId":"26BF2608-7FB2-455B-AC89-74732C982034"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-001","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-001","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0388","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DataLynx suGuard trusts the PATH environment variable to execute the ps command, allowing local users to execute commands as root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:datalynx:suguard:1.0:*:*:*:*:*:*:*","matchCriteriaId":"A798A878-3393-4EFA-A625-7912CE146C80"}]}]}],"references":[{"url":"http://www.osvdb.org/3186","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3186","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0393","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can cause a denial of service in Sendmail 8.8.x and 8.9.2 by sending messages with a large number of headers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8:*:*:*:*:*:*:*","matchCriteriaId":"C973CF06-BEE8-4D79-8649-1510E9EFC29D"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.9.2:*:*:*:*:*:*:*","matchCriteriaId":"62604D5F-5C2D-4FA3-903C-E52F129318E1"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91694391227372&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91694391227372&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0394","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DPEC Online Courseware allows an attacker to change another user's password without knowing the original password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=91651770630788&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=91651770630788&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0395","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition in the BackWeb Polite Agent Protocol allows an attacker to spoof a BackWeb server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:backweb_technologies:backweb_polite_agent_protocol:*:*:*:*:*:*:*:*","matchCriteriaId":"7571C28E-3460-4481-918C-578D72E2BA1A"}]}]}],"references":[{"url":"http://xforce.iss.net/alerts/advise17.php","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://xforce.iss.net/alerts/advise17.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0397","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The demo version of the Quakenbush NT Password Appraiser sends passwords across the network in plaintext."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0397","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0397","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0398","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In some instances of SSH 1.2.27 and 2.0.11 on Linux systems, SSH will allow users with expired accounts to login."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"338EDA76-05D6-48C0-952E-6244A5F206F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"B7735CDD-8BFC-4E30-9C88-27C8943637CA"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0398","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0399","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The DCC server command in the Mirc 5.5 client doesn't filter characters from file names properly, allowing remote attackers to place a malicious file in a different location, possibly allowing the attacker to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:khaled_mardam-bey:mirc:5.5:*:*:*:*:*:*:*","matchCriteriaId":"223779ED-745D-493C-8FD5-1ADE46163B36"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0399","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0399","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0401","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition in Linux 2.2.1 allows local users to read arbitrary memory from /proc files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:P","baseScore":3.7,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"AD7A6B55-2F3B-422E-B1F2-80B482FE89AA"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0401","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0401","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0448","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.0 and Apache log HTTP request methods, regardless of how long they are, allowing a remote attacker to hide the URL they really request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0448","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0452","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A service or application has a backdoor password that was placed there by the developer."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0452","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0452","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0453","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*","matchCriteriaId":"EF6E96F8-E95E-4F3A-8CAF-936327BA3E54"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0453","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorComment":"Please see the following link for more information:\r\n\r\nhttp://seclists.org/bugtraq/1999/Jan/0215.html"}},{"cve":{"id":"CVE-1999-0454","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote attacker can sometimes identify the operating system of a host based on how it reacts to some IP or ICMP packets, using a tool such as nmap or queso."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2048","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2048","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0465","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can crash Lynx and Internet Explorer using an IMG tag with a large width parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0465","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0465","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0495","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote attacker can gain access to a file system using ..  (dot dot) when accessing SMB shares."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/837","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/837","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0497","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Anonymous FTP is enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0497","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0497","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"Anonymous FTP is an unsecured protocol for Internet facing systems and should only be used on a limited basis to provide a specific functional requirement, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0512","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A mail server is explicitly configured to allow SMTP mail relay, which allows abuse by spammers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0512","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0512","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0515","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An unrestricted remote trust relationship for Unix systems has been set up, e.g. by using a + sign in /etc/hosts.equiv."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0515","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0515","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0520","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system-critical NETBIOS/SMB share has inappropriate access control."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0523","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ICMP echo (ping) is allowed from arbitrary hosts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0523","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0523","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Red Hat","comment":"Red Hat Enterprise Linux by default does respond to ICMP echo requests, although it’s likely that in a production environment those would be filtered by some firewall on entry to your network.  However you can happily block ICMP ping responses using iptables if you so wish, but note that there is no known vulnerability in allowing them.\n\nFor more details, please see:\nhttp://kbase.redhat.com/faq/FAQ_43_4304.shtm","lastModified":"2007-09-11T00:00:00"}]}},{"cve":{"id":"CVE-1999-0527","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The permissions for system-critical data in an anonymous FTP account are inappropriate.  For example, the root directory is writeable by world, a real password file is obtainable, or executable commands such as \"ls\" can be overwritten."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6253","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/6253","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0528","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A router or firewall forwards external packets that claim to come from inside the network that the router/firewall is in front of."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8372","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8372","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0529","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A router or firewall forwards packets that claim to come from IANA reserved or private addresses, e.g. 10.x.x.x, 127.x.x.x, 217.x.x.x, etc."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0529","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0529","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0530","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system is operating in \"promiscuous\" mode which allows it to perform packet sniffing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/778","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/778","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0531","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:58.853","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"An SMTP service supports EXPN, VRFY, HELP, ESMTP, and/or EHLO."}],"metrics":{},"references":[],"evaluatorSolution":"This functionality should be disabled, because these commands can be used for attack reconnaissance.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0539","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A trust relationship exists between two Unix hosts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/723","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/723","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0547","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An SSH server allows authentication through the .rhosts file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/315","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/315","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0548","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A superfluous NFS server is running, but it is not importing or exporting any file systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0548","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0548","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0549","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT automatically logs in an administrator upon rebooting."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0549","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0549","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0554","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NFS exports system-critical data to the world, e.g. / or a password file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0554","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0554","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0555","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Unix account with a name other than \"root\" has UID 0, i.e. root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0555","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0555","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0556","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Two or more Unix accounts have the same UID."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/876","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/876","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0559","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system-critical Unix file or directory has inappropriate permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0559","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0559","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0560","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system-critical Windows NT file or directory has inappropriate permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0560","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0560","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0561","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS has the #exec function enabled for Server Side Include (SSI) files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0561","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0561","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0564","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker can force a printer to print arbitrary documents (e.g. if the printer doesn't require a password) or to become disabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0564","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0564","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0565","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Sendmail alias allows input to be piped to a program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0565","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0565","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0568","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.admind in Solaris is not running in a secure mode."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:*:*:*:*:*:*","matchCriteriaId":"469B74F2-4B89-42B8-8638-731E92D463B9"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0568","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0568","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0569","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A URL for a WWW directory allows auto-indexing, which provides a list of all files in that directory if it does not contain an index.html file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0569","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0569","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0570","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT is not using a password filter utility, e.g. PASSFILT.DLL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0570","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0570","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0571","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A router's configuration service or management interface (such as a web server or telnet) is configured to allow connections from arbitrary hosts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0571","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0571","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0577","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT system's file audit policy does not log an event success or failure for non-critical files or directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0577","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0577","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0578","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT system's registry audit policy does not log an event success or failure for security-critical registry keys."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/228","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/228","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0579","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT system's registry audit policy does not log an event success or failure for non-critical registry keys."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/228","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/228","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0580","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The HKEY_LOCAL_MACHINE key in a Windows NT system has inappropriate, system-critical permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0580","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0580","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0581","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The HKEY_CLASSES_ROOT key in a Windows NT system has inappropriate, system-critical permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0581","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0581","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0583","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"There is a one-way or two-way trust relationship between Windows NT domains."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1284","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1284","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0584","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT file system is not NTFS."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/195","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/195","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0586","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A network service is running on a nonstandard port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0586","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0586","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0587","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A WWW server is not running in a restricted file system, e.g. through a chroot, thus allowing access to system-critical data."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0587","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0587","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0588","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A filter in a router or firewall allows unusual fragmented packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0588","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0588","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0589","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system-critical Windows NT registry key has inappropriate permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0589","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0589","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0591","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An event log in Windows NT has inappropriate access permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0591","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0591","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0592","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Logon box of a Windows NT system displays the name of the last user who logged in."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1353","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1353","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0593","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default setting for the Winlogon key entry ShutdownWithoutLogon in Windows NT allows users with physical access to shut down a Windows NT system without logging in."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:C","baseScore":4.9,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://osvdb.org/59333","source":"cve@mitre.org"},{"url":"http://technet.microsoft.com/en-us/library/cc722469.aspx","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/archive/winntas/deploy/confeat/06wntpcc.mspx?mfr=true","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1291","source":"cve@mitre.org"},{"url":"http://osvdb.org/59333","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://technet.microsoft.com/en-us/library/cc722469.aspx","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.microsoft.com/technet/archive/winntas/deploy/confeat/06wntpcc.mspx?mfr=true","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1291","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0594","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT system does not restrict access to removable media drives such as a floppy disk drive or CDROM drive."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1294","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1294","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0596","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT log file has an inappropriate maximum size or retention period."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2577","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2577","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0597","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT account policy does not forcibly disconnect remote users from the server when their logon hours expire."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1343","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1343","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0598","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A network intrusion detection system (IDS) does not properly handle packets that are sent out of order, allowing an attacker to escape detection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"cve@mitre.org"},{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0599","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A network intrusion detection system (IDS) does not properly handle packets with improper sequence numbers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"cve@mitre.org"},{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0600","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A network intrusion detection system (IDS) does not verify the checksum on a packet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"cve@mitre.org"},{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0601","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A network intrusion detection system (IDS) does not properly handle data within TCP handshake packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"cve@mitre.org"},{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0602","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A network intrusion detection system (IDS) does not properly reassemble fragmented packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"cve@mitre.org"},{"url":"http://www.robertgraham.com/mirror/Ptacek-Newsham-Evasion-98.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0603","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Windows NT, an inappropriate user is a member of a group, e.g. Administrator, Backup Operators, Domain Admins, Domain Guests, Power Users, Print Operators, Replicators, System Operators, etc."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0603","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0603","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0611","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system-critical Windows NT registry key has an inappropriate value."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0611","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0611","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0613","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rpc.sprayd service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0613","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0613","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"rpc.sprayd is an unsecured protocol for Internet facing systems and should only be used on a trusted network segment, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0614","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.310","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The FTP service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The FTP Service is an unsecured protocol for Internet facing systems and should only be used on a limited basis to provide a specific functional requirement, otherwise disabled.  Secure alternatives that encrypt communications are available.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0615","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.343","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The SNMP service is running."}],"metrics":{},"references":[],"evaluatorSolution":"SNMPv3 is a secure protocol for management of networked systems, provided the cryptographic security mechanisms are used.  SNMPv1 and SNMPv2 are unsecured protocols for Internet facing systems and should  only be used on a trusted network segment.  For all versions, the software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0616","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.373","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The TFTP service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The TFTP Service is an unsecured protocol and it should used only on a limited basis on rare occasion to provide a specific functional requirement, otherwise disabled.  Secure alternatives are available.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0617","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.410","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The SMTP service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The SMTP Service is an unsecured protocol for Internet facing systems (e.g., user authentication not required, communications not encrypted) and should only be used on a limited basis to provide a specific functional requirement, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0618","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rexec service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0618","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0618","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0619","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.450","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The Telnet service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The Telnet Service is an unsecured and obsolete protocol and it should be disabled.  Secure alternatives such as SSH are available.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0620","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.480","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"A component service related to NIS is running."}],"metrics":{},"references":[],"evaluatorSolution":"These protocols, such as RPC ypbind, yppasswd, ypserv, ypupdated, and ypxfrd, are unsecured protocols for Internet facing systems and should only be used on a trusted network segment, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0621","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.540","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"A component service related to NETBIOS is running."}],"metrics":{},"references":[],"evaluatorSolution":"This component service should not be allowed to communicate over untrusted networks, such as the Internet, because it is an unsecured protocol (e.g., communications not encrypted).   The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0622","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.607","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"A component service related to DNS service is running."}],"metrics":{},"references":[],"evaluatorSolution":"DNS is a critical network service.  It should be fully patched and properly configured for Internet facing servers to avoid common attacks such as DNS spoofing, poisoning, and unauthorized zone transfers.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0623","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.640","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The X Windows service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The XWindows service is an unsecured protocol for Internet facing system and should only be used on a trusted network segment, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0624","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rstat/rstatd service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0624","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0624","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"These are unsecured and obsolete protocols and they should be disabled.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0625","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rpc.rquotad service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0625","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0625","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"rpc.rquotad is an unsecured and obsolete protocol and it should be disabled.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0629","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ident/identd service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0630","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The NT Alerter and Messenger services are running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q189/2/71.asp","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q189/2/71.asp","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0631","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.713","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The NFS service is running."}],"metrics":{},"references":[],"evaluatorSolution":"NFS Service is an unsecured protocol for Internet facing systems (e.g., user authentication not required, communications not encrypted) and should only be used on a trusted managed network, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0632","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The RPC portmapper service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0632","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0632","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The RPC portmapper service is an unsecured protocol for Internet facing systems and should only be used on a trusted network segment, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0633","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.750","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The HTTP/WWW service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The software should be patched and configured properly.  SSL/TLS should be used to protect transmissions of sensitive data.  The presence of HTTP may be an indication that an web application server is running on the system.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0634","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.870","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The SSH service is running."}],"metrics":{},"references":[],"evaluatorSolution":"SSH is a secure protocol, provided it is fully patched, properly configured, and uses FIPS approved algorithms.  SSH version 2 is preferred over SSH version 1 because of known flaws in version 1.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0635","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The echo service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/18514","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://secunia.com/advisories/18514","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}],"evaluatorSolution":"The Echo Service is an unsecured and obsolete protocol and it should be disabled.  Historically it has been used to perform denial of service attacks.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0636","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The discard service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0636","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0636","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0637","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The systat service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0637","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0637","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The systat service is an unsecured and obsolete protocol and it should be disabled because it can reveal information about a host's operations.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0638","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The daytime service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0638","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0638","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The daytime service is an unsecured and obsolete protocol and it should be disabled.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0639","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The chargen service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0639","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0639","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"chargen service is an unsecured and obsolete protocol and it should be disabled.  Historically it has been used to perform denial of service attacks.  Ping and traceroute can be used to provide the same functionality.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0640","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Gopher service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0640","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0640","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0641","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The UUCP service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The UUCP Service is an unsecured and obsolete protocol and it should be disabled.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0642","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:54:59.973","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"A POP service is running."}],"metrics":{},"references":[],"evaluatorSolution":"POP3 is an unsecured protocol for Internet facing systems that does not encrypt its transmissions.  POP3 should be tunneled over SSL/TLS or another encrypted tunnel.  The software should be patched and configured properly.  Earlier versions of POP, such as POP2, are unsecured and obsolete, and should be disabled.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0643","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.010","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The IMAP service is running."}],"metrics":{},"references":[],"evaluatorSolution":"IMAP Service is an unsecured protocol for Internet facing systems that does not encrypt its transmissions.  IMAP should be tunneled over SSL/TLS or another encrypted tunnel.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0644","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.043","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The NNTP news service is running."}],"metrics":{},"references":[],"evaluatorSolution":"NNTP news service is an unsecured protocol for Internet facing systems (e.g., user authentication not required, communications not encrypted).  It could be tunneled over SSL/TLS.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0645","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.070","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The IRC service is running."}],"metrics":{},"references":[],"evaluatorSolution":"IRC Service is an unsecured protocol that typically does not authenticate the identity of users and does not encrypt its network communications.  IRC is not commonly deployed on enterprise networks.  If an organization decides to use it, it should be patched and configured properly, otherwise it should be disabled.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0646","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.103","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The LDAP service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The software should be patched and configured properly to prevent information disclosure.  It can be tunneled over SSL/TLS.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0647","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.137","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The bootparam (bootparamd) service is running."}],"metrics":{},"references":[],"evaluatorSolution":"The bootparam service is an unsecured protocol for Internet facing systems and should only be used on a trusted network segment, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0648","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.170","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The X25 service is running."}],"metrics":{},"references":[],"evaluatorSolution":"X25 is an unsecured protocol for Internet facing systems and should only be used on a limited basis to provide a specific functional requirement, otherwise disabled.  The software should be patched and configured properly.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0649","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.207","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"The FSP service is running."}],"metrics":{},"references":[]}},{"cve":{"id":"CVE-1999-0650","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The netstat service is running, which provides sensitive information to remote attackers."},{"lang":"es","value":"El servicio netstat se está ejecutando, lo que provee información sensible a atacantes remotos."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/72","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0651","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rsh/rlogin service is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2995","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2995","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0652","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.253","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"A database service is running, e.g. a SQL server, Oracle, or mySQL."}],"metrics":{},"references":[],"evaluatorSolution":"The software should be patched and configured properly to prevent information leakage and unauthorized access.","evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0653","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A component service related to NIS+ is running."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0653","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0653","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0654","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The OS/2 or POSIX subsystem in NT is enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0654","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0654","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0655","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.307","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE.  Notes: the former description is: \"A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities."}],"metrics":{},"references":[],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0656","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-16"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","matchCriteriaId":"155AD4FB-E527-4103-BCEF-801B653DEA37"}]}]}],"references":[{"url":"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/348","source":"cve@mitre.org"},{"url":"http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/348","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0657","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WinGate is being used."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:N","baseScore":0.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":10.0,"impactScore":0.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0657","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0657","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0658","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.370","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"DCOM is running."}],"metrics":{},"references":[],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0659","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.407","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present."}],"metrics":{},"references":[],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0660","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2023-11-07T01:55:00.443","vulnStatus":"Rejected","cveTags":[],"descriptions":[{"lang":"en","value":"Rejected reason: DO NOT USE THIS CANDIDATE NUMBER.  ConsultIDs: None.  Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE.  It might be more appropriate to cover under the Common Configuration Enumeration (CCE).  Notes: the former description is: \"A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc."}],"metrics":{},"references":[],"evaluatorImpact":"This Common Vulnerabilities and Exposures (CVE) entry is a configuration issue and not a software flaw. As such, it doesn’t fit in the CVE software flaw list. The Common Vulnerability Scoring System (CVSS) base score for this CVE entry has been set to 0 because this CVE entry has no impact as a software flaw according to CVSS. This does not mean that the configuration issue is not important and there may be security implications relative to computers having this configuration."}},{"cve":{"id":"CVE-1999-0661","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=102820843403741&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=102821663814127&w=2","source":"cve@mitre.org"},{"url":"http://online.securityfocus.com/archive/1/294539","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1994-07.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1994-14.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1999-01.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1999-02.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-2002-28.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.iss.net/security_center/static/10313.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/5921","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=102820843403741&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=102821663814127&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://online.securityfocus.com/archive/1/294539","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-1994-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1994-14.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1999-01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-1999-02.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.cert.org/advisories/CA-2002-28.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.iss.net/security_center/static/10313.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/5921","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0662","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0662","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0662","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0663","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0663","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0663","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0664","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An application-critical Windows NT registry key has inappropriate permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0664","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0664","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0665","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An application-critical Windows NT registry key has an inappropriate value."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0665","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0665","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0698","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0698","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0698","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1430","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PIM software for Royal daVinci does not properly password-protext access to data stored in the .mdb (Microsoft Access) file, which allows local users to read the data without a password by directly accessing the files with a different application, such as Access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:royal:davinci:1.0:*:*:*:*:*:*:*","matchCriteriaId":"EB0B3280-54D4-4158-A9FC-98CE007EF904"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91540043723185&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/185","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91540043723185&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/185","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1440","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Win32 ICQ 98a 1.30, and possibly other versions, does not display the entire portion of long filenames, which could allow attackers to send an executable file with a long name that contains so many spaces that the .exe extension is not displayed, which could make the user believe that the file is safe to open from the client."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq_98a:*:*:*:*:*:*:*:*","versionEndIncluding":"1.30","matchCriteriaId":"496E6612-1278-4A40-891E-B1B9B6596107"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91522424302962&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/132","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91522424302962&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/132","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1568","sourceIdentifier":"cve@mitre.org","published":"1999-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Off-by-one error in NcFTPd FTP server before 2.4.1 allows a remote attacker to cause a denial of service (crash) via a long PORT command."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-193"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-193"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ncftp:ncftpd_server:*:*:*:*:*:*:*:*","versionEndExcluding":"2.4.1","matchCriteriaId":"3D72A5C7-F7F3-41D4-A909-DBBD0B00C05E"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91981352617720&w=2","source":"cve@mitre.org","tags":["Mailing List"]},{"url":"http://www.securityfocus.com/archive/1/12699","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1833","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://marc.info/?l=bugtraq&m=91981352617720&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List"]},{"url":"http://www.securityfocus.com/archive/1/12699","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1833","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0402","sourceIdentifier":"cve@mitre.org","published":"1999-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wget 1.5.3 follows symlinks to change permissions of the target file instead of the symlink itself."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:wget:1.5.3:*:*:*:*:*:*:*","matchCriteriaId":"50DD71F2-0B3C-4082-950A-CBFA5C601AEF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0402","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0402","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1170","sourceIdentifier":"cve@mitre.org","published":"1999-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IPswitch IMail allows local users to gain additional privileges and modify or add mail accounts by setting the \"flags\" registry key to 1920."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EFEFE5A5-6589-4316-9C9F-2F8109696158"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*","matchCriteriaId":"D9BE1954-74C5-4A91-9C9A-C0647F281017"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*","matchCriteriaId":"3DE6789D-5DA5-489F-A900-F4788286ACE5"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=91816507920544&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/218","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://marc.info/?l=ntbugtraq&m=91816507920544&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/218","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-1422","sourceIdentifier":"cve@mitre.org","published":"1999-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of Slackware 3.4, and possibly other versions, includes . (dot, the current directory) in the PATH environmental variable, which could allow local users to create Trojan horse programs that are inadvertently executed by other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:2.0.35:*:*:*:*:*:*:*","matchCriteriaId":"82E436BF-6017-4A3F-AD98-683019DCE436"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91540043023167&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/211","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91540043023167&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/211","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0005","sourceIdentifier":"cve@mitre.org","published":"1999-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP-UX aserver program allows local users to gain privileges via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:7.00:*:*:*:*:*:*:*","matchCriteriaId":"903312B4-BE2F-4170-AA8A-2802E2554662"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:7.02:*:*:*:*:*:*:*","matchCriteriaId":"4E21C6EC-D15D-487B-B2FA-BF32D9B8EA79"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:7.04:*:*:*:*:*:*:*","matchCriteriaId":"DC664E65-5C9C-4796-86E5-A0B2539ED793"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:7.06:*:*:*:*:*:*:*","matchCriteriaId":"DA3F0D15-D854-4BD0-8590-9C941840BC5B"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:7.08:*:*:*:*:*:*:*","matchCriteriaId":"23628ED6-1EF9-494F-BBA0-DEC67A6B12E3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*","matchCriteriaId":"A573388D-BD8F-48D3-8BA9-E4D11402CA22"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.01:*:*:*:*:*:*:*","matchCriteriaId":"9B172217-D993-4D8C-8E37-4D966D103AAF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*","matchCriteriaId":"6973B4FC-8009-4336-BED4-7B032EA1E570"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.04:*:*:*:*:*:*:*","matchCriteriaId":"2777DC9F-683A-4892-B305-4EFEFDDBCCE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*","matchCriteriaId":"31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*","matchCriteriaId":"D0EB2E93-9774-442C-BB60-E428F53EE6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.07:*:*:*:*:*:*:*","matchCriteriaId":"44521B9A-7796-4E4A-99F0-026D45BDB7B5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.08:*:*:*:*:*:*:*","matchCriteriaId":"F489B454-F1ED-4DEA-8248-A97D68611FCD"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:8.09:*:*:*:*:*:*:*","matchCriteriaId":"C6296277-D10E-4CAA-96F5-BEB61B4640FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*","matchCriteriaId":"6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*","matchCriteriaId":"DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*","matchCriteriaId":"E7FA635E-C0FE-495C-A2BB-D9C30A95FD00"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*","matchCriteriaId":"E178238D-E17A-48C9-8922-AC92474BDF55"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*","matchCriteriaId":"560C17E1-6154-4291-A838-5E76139B9FB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*","matchCriteriaId":"3194CFA3-F0B3-487A-99C6-1A7DF1EF0586"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*","matchCriteriaId":"035890F7-BF48-4669-812A-1DCBD91A8F34"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*","matchCriteriaId":"F9AED8F3-2501-444D-8141-37FEE2246747"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*","matchCriteriaId":"10974B0F-DA3A-4E3E-8914-8CEB366E9CC4"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*","matchCriteriaId":"C54F7F74-7DD7-431E-AE75-1D1199D63032"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*","matchCriteriaId":"2170549C-80D2-4FF8-AC07-BD4124125B02"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*","matchCriteriaId":"066D4E93-366F-42D4-B27D-8AF981F5F2AD"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*","matchCriteriaId":"38E41C26-A086-4C9C-83D8-CB910F4B67F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*","matchCriteriaId":"CFD50216-90AC-480E-A11C-E88E64C6D84A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:aserver:*:*:*:*:*:*:*:*","matchCriteriaId":"F978F803-AC52-4856-A86F-CD53E9F6C6D6"},{"vulnerable":true,"criteria":"cpe:2.3:h:hp:9000:7_800:*:*:*:*:*:*:*","matchCriteriaId":"587A1F2E-EBE3-4349-A859-A2B780C51CC4"}]}]}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0389","sourceIdentifier":"cve@mitre.org","published":"1999-01-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the bootp server in the Debian Linux netstd package."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A9EDD1D3-6E5C-4D98-9360-33949353BD7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"87E89840-3B57-4CBA-BE90-0BBA61F21F96"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"745ACC17-B6D6-4B4E-9648-A8B45C4A3F7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"7A632089-47D7-410D-AE12-F801193FA18F"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/324","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/324","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0914","sourceIdentifier":"cve@mitre.org","published":"1999-01-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the FTP client in the Debian GNU/Linux netstd package."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.1:*:*:*:*:*:*:*","matchCriteriaId":"A9EDD1D3-6E5C-4D98-9360-33949353BD7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"87E89840-3B57-4CBA-BE90-0BBA61F21F96"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"745ACC17-B6D6-4B4E-9648-A8B45C4A3F7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"7A632089-47D7-410D-AE12-F801193FA18F"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/324","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/324","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0054","sourceIdentifier":"cve@mitre.org","published":"1999-01-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"search.cgi in the SolutionScripts Home Free package allows remote attackers to view directories via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:solution_scripts:home_free:1.0:*:*:*:*:*:*:*","matchCriteriaId":"D14F142F-FD23-497D-9080-0F22BF179E0A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/921","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/921","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0390","sourceIdentifier":"cve@mitre.org","published":"1999-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Dosemu Slang library in Linux."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"830D48B8-D21D-4D31-99A1-20C231804DBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5C0BBDD2-9FF9-4CB7-BCAF-D4AF15DC2C7C"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-006.1.txt","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/187","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-006.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/187","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0464","sourceIdentifier":"cve@mitre.org","published":"1999-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local users can perform a denial of service in Tripwire 1.2 and earlier using long filenames."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tripwire:tripwire:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2","matchCriteriaId":"E13D2DE3-0BFB-4C49-A462-9117FD727B40"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91553066310826&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91592136122066&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6609","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91553066310826&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91592136122066&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6609","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0391","sourceIdentifier":"cve@mitre.org","published":"1999-01-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The cryptographic challenge of SMB authentication in Windows 95 and Windows 98 can be reused, allowing an attacker to replay the response and impersonate a user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp1:*:*:*:*:*:*","matchCriteriaId":"EF8BECF6-3C33-4D8C-B54E-A0D2F3295E81"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp2:*:*:*:*:*:*","matchCriteriaId":"828B4519-24D8-45A7-8448-D5FF6C83A2C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp3:*:*:*:*:*:*","matchCriteriaId":"F495AF7A-CC31-4045-BACC-902950C80ABF"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp4:*:*:*:*:*:*","matchCriteriaId":"68DFA54C-3DB9-4A94-A446-CF28671FE4F6"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp5:*:*:*:*:*:*","matchCriteriaId":"55A2AC4C-6B85-4B60-BFE1-C9588C5973B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=91552769809542&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=91552769809542&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0458","sourceIdentifier":"cve@mitre.org","published":"1999-01-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"L0phtcrack 2.5 used temporary files in the system TEMP directory which could contain password information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:l0pht:l0phtcrack:2.5:*:*:*:*:*:*:*","matchCriteriaId":"BFA5C409-12E4-47B8-B0E2-A11EE687EE4A"}]}]}],"references":[{"url":"http://www.osvdb.org/915","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/915","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1268","sourceIdentifier":"cve@mitre.org","published":"1999-01-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in KDE konsole allows local users to hijack or observe sessions of other users by accessing certain devices."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:*:*:*:*:*:*:*:*","matchCriteriaId":"D54C9BCD-7544-4005-8F61-45C3EC054385"}]}]}],"references":[{"url":"http://lists.kde.org/?l=kde-devel&m=91560433413263&w=2","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1645","source":"cve@mitre.org"},{"url":"http://lists.kde.org/?l=kde-devel&m=91560433413263&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1645","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0442","sourceIdentifier":"cve@mitre.org","published":"1999-01-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris ff.core allows local users to modify files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/327","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/327","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0392","sourceIdentifier":"cve@mitre.org","published":"1999-01-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Thomas Boutell's cgic library version up to 1.05."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:thomas_boutell:cgic_library:*:*:*:*:*:*:*:*","versionEndIncluding":"1.05","matchCriteriaId":"921BE0C0-B2CE-4EC6-BBBA-8CBDBAF5AD22"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0392","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0392","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0063","sourceIdentifier":"cve@mitre.org","published":"1999-01-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*","matchCriteriaId":"D8783C0A-990A-4B79-8BF9-64E425DA585E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*","matchCriteriaId":"046D8679-38F8-4DC9-82A7-2562DE0495F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","matchCriteriaId":"8F86F790-6247-42F2-9487-3D60A2842F52"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*","matchCriteriaId":"53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*","matchCriteriaId":"AE210B04-7ECD-419C-9258-0F619A353A8A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*","matchCriteriaId":"3B467741-B277-4128-9804-E13ED23FD310"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*","matchCriteriaId":"5E7EE856-9CE7-49FD-8ADC-05C580CD54A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*","matchCriteriaId":"5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*","matchCriteriaId":"C48466C4-5A1E-4C71-8822-32D387B36B8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*","matchCriteriaId":"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*","matchCriteriaId":"2C398460-3F38-4AA7-A4B1-FD8A01588DB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*","matchCriteriaId":"CA7F94E8-86FC-456B-A7BB-57953F67F754"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0063","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0063","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1172","sourceIdentifier":"cve@mitre.org","published":"1999-01-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"By design, Maximizer Enterprise 4 calendar and address book program allows arbitrary users to modify the calendar of other users when the calendar is being shared."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:maximizer:maximizer_enterprise:4:*:*:*:*:*:*:*","matchCriteriaId":"E0BA5470-4FC1-4BCA-9C20-A3757C02B508"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/11947","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/11947","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-1376","sourceIdentifier":"cve@mitre.org","published":"1999-01-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in fpcount.exe in IIS 4.0 with FrontPage Server Extensions allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91638375309890&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91632724913080&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91638375309890&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=91632724913080&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1538","sourceIdentifier":"cve@mitre.org","published":"1999-01-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When IIS 2 or 3 is upgraded to IIS 4, ism.dll is inadvertently left in /scripts/iisadmin, which does not restrict access to the local machine and allows an unauthorized user to gain access to sensitive server information, including the Administrator's password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91638375309890&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91632724913080&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/189","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://marc.info/?l=bugtraq&m=91638375309890&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=91632724913080&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/189","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-0457","sourceIdentifier":"cve@mitre.org","published":"1999-01-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux ftpwatch program allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"745ACC17-B6D6-4B4E-9648-A8B45C4A3F7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"7A632089-47D7-410D-AE12-F801193FA18F"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/317","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/317","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0678","sourceIdentifier":"cve@mitre.org","published":"1999-01-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*","matchCriteriaId":"D623D8C0-65D2-4269-A1D4-5CB3899F44C8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/318","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/318","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0119","sourceIdentifier":"cve@mitre.org","published":"1999-01-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 beta allows users to read and delete shares."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:beta:*:*:*:*:*","matchCriteriaId":"567075E0-2F68-4B60-B29C-B030C9076530"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/11","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0451","sourceIdentifier":"cve@mitre.org","published":"1999-01-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Linux 2.0.36 allows local users to prevent any server from listening on any non-privileged port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*","matchCriteriaId":"96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"146F7A77-A950-4CAD-BDA9-C239696F569D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/343","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/343","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0121","sourceIdentifier":"cve@mitre.org","published":"1999-01-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in dtaction command gives root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0121","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0121","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1264","sourceIdentifier":"cve@mitre.org","published":"1999-01-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WebRamp M3 router does not disable remote telnet or HTTP access to itself, even when access has been explicitly disabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp:300:*:*:*:*:*:*:*","matchCriteriaId":"917A7968-E410-46FE-A44D-585B8BC3E34A"},{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp:m3:*:*:*:*:*:*:*","matchCriteriaId":"7032B75E-7490-42D8-8284-22CB61F1E5DE"},{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp:m3i:*:*:*:*:*:*:*","matchCriteriaId":"31C9BDDE-03E6-4C10-A6C3-D71E5A152C8E"},{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp:m3t:*:*:*:*:*:*:*","matchCriteriaId":"24053FF2-851C-4AB9-B4A6-864A4C94065D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91815321510224&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12048","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1670","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91815321510224&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/12048","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1670","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1544","sourceIdentifier":"cve@mitre.org","published":"1999-01-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FTP server in Microsoft IIS 3.0 and 4.0 allows local and sometimes remote attackers to cause a denial of service via a long NLST (ls) command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91722115016183&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91722115016183&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0352","sourceIdentifier":"cve@mitre.org","published":"1999-01-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ControlIT 4.5 and earlier (aka Remotely Possible) has weak password encryption."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0352","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0352","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0356","sourceIdentifier":"cve@mitre.org","published":"1999-01-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ControlIT v4.5 and earlier uses weak encryption to store usernames and passwords in an address book."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0356","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0356","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0357","sourceIdentifier":"cve@mitre.org","published":"1999-01-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 98 and other operating systems allows remote attackers to cause a denial of service via crafted \"oshare\" packets, possibly involving invalid fragmentation offsets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0357","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0357","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1458","sourceIdentifier":"cve@mitre.org","published":"1999-01-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in at program in Digital UNIX 4.0 allows local users to gain root privileges via a long command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E1E08495-C0C5-40A9-A8FF-834F5F6083B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*","matchCriteriaId":"781D13E2-35BB-4D58-A68F-86401D08D438"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*","matchCriteriaId":"07476CFD-859F-4AD7-8514-130E7A86BAE5"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0c:*:*:*:*:*:*:*","matchCriteriaId":"A5F097D7-CD52-44FC-851C-7DB42E57DCB8"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*","matchCriteriaId":"8C250283-4343-4569-A6EA-988FB7319AA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0e:*:*:*:*:*:*:*","matchCriteriaId":"32AE5D68-92A0-4950-A6FF-ECD5F56FDD90"}]}]}],"references":[{"url":"http://ftp1.support.compaq.com/public/dunix/v4.0d/ssrt0583u.README","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/12121","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3138","source":"cve@mitre.org"},{"url":"http://ftp1.support.compaq.com/public/dunix/v4.0d/ssrt0583u.README","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/12121","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3138","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0347","sourceIdentifier":"cve@mitre.org","published":"1999-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.01 allows remote attackers to read local files and spoof web pages via a \"%01\" character in an \"about:\" Javascript URL, which causes Internet Explorer to use the domain specified after the character."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91745430007021&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91756771207719&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91745430007021&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=91756771207719&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0400","sourceIdentifier":"cve@mitre.org","published":"1999-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Linux 2.2.0 running the ldd command on a core file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"146F7A77-A950-4CAD-BDA9-C239696F569D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/344","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/344","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0449","sourceIdentifier":"cve@mitre.org","published":"1999-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ExAir sample site in IIS 4 allows remote attackers to cause a denial of service (CPU consumption) via a direct request to the (1) advsearch.asp, (2) query.asp, or (3) search.asp scripts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://www.osvdb.org/2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/193","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/193","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0450","sourceIdentifier":"cve@mitre.org","published":"1999-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In IIS, an attacker could determine a real path using a request for a non-existent URL that would be interpreted by Perl (perl.exe)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E701AB0D-E335-47DF-A0CA-607D5C6E9255"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/194","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/194","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0348","sourceIdentifier":"cve@mitre.org","published":"1999-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS ASP caching problem releases sensitive information when two virtual servers share the same physical directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ197003","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/930","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ197003","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/930","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0349","sourceIdentifier":"cve@mitre.org","published":"1999-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow in the FTP list (ls) command in IIS allows remote attackers to conduct a denial of service and, in some cases, execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ188348","source":"cve@mitre.org"},{"url":"http://www.eeye.com/html/Research/Advisories/IIS%20Remote%20FTP%20Exploit/DoS%20Attack.html","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-003","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ188348","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.eeye.com/html/Research/Advisories/IIS%20Remote%20FTP%20Exploit/DoS%20Attack.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-003","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1450","sourceIdentifier":"cve@mitre.org","published":"1999-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in (1) rlogin daemon rshd and (2) scheme on SCO UNIX OpenServer 5.0.5 and earlier, and SCO UnixWare 7.0.1 and earlier, allows remote attackers to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0.5","matchCriteriaId":"641472D4-4143-47A7-B3CE-84021F67EC75"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"035FBF8B-EB91-4211-9979-8A9E913A54A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1.3","matchCriteriaId":"B64BFE2D-88F0-4046-9D0C-96D215AD935E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:*:*:*:*:*:*:*:*","versionEndIncluding":"7.0.1","matchCriteriaId":"1ED5F32A-8869-407C-B79B-49ECE360B3F3"}]}]}],"references":[{"url":"ftp://ftp.sco.COM/SSE/sse020.ltr","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.03b","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.06b","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.COM/SSE/sse020.ltr","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.03b","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.06b","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0461","sourceIdentifier":"cve@mitre.org","published":"1999-01-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Versions of rpcbind including Linux, IRIX, and Wietse Venema's rpcbind allow a remote attacker to insert and delete entries by spoofing a source address."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","matchCriteriaId":"056B3397-81A9-4128-9F49-ECEBE1743EE8"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0461","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0461","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0952","sourceIdentifier":"cve@mitre.org","published":"1999-01-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris lpstat via class argument allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91759216618637&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91759216618637&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1546","sourceIdentifier":"cve@mitre.org","published":"1999-01-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"netstation.navio-com.rte 1.1.0.1 configuration script for Navio NC on IBM AIX exports /tmp over NFS as world-readable and world-writable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:navio_nc_browser:1.1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3423E98F-A223-4D71-8F8B-B1CEC011B6B4"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12217","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1724","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12217","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1724","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0370","sourceIdentifier":"cve@mitre.org","published":"1999-01-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The debug option in Caldera Linux smail allows remote attackers to execute commands via shell metacharacters in the -D option for the rmail command."},{"lang":"es","value":"La opción de depuración en smail de Caldera Linux permite a atacantes remotos ejecutar comandos mediante metacaracteres de shell en la opción -D del comando rmail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.1:*:*:*:*:*:*:*","matchCriteriaId":"F8A9DB15-1F04-4864-A8AD-FCCB35A63B2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"A5C77FA7-C977-4223-B6AC-91B82C45129C"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"EED21F27-4ADA-42AC-B28E-F849F47D4043"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-001.0.txt","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1268","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-001.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1268","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0360","sourceIdentifier":"cve@mitre.org","published":"1999-01-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MS Site Server 2.0 with IIS 4 can allow users to upload content, including ASP, to the target web site, thus allowing them to execute commands remotely."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"447E490B-C3C4-4B0B-8F95-FBD871A412B6"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91763097004101&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91763097004101&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0291","sourceIdentifier":"cve@mitre.org","published":"1999-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WinGate proxy is installed without a password, which allows remote attackers to redirect connections without authentication."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qbik:wingate:*:*:*:*:*:*:*:*","matchCriteriaId":"E13C7802-12EA-41D8-B145-43621072999A"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0291","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0291","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0351","sourceIdentifier":"cve@mitre.org","published":"1999-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTP PASV \"Pizza Thief\" denial of service and unauthorized data access.  Attackers can steal data by connecting to a port that was intended for use by a client."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ftp:ftp_pasv:*:*:*:*:*:*:*:*","matchCriteriaId":"11B890DA-EDA2-4CC2-8F80-0446C0F3CD8D"}]}]}],"references":[{"url":"http://attrition.org/security/advisory/misc/infowar/iw_sec_01.txt","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3389","source":"cve@mitre.org"},{"url":"http://attrition.org/security/advisory/misc/infowar/iw_sec_01.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3389","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0358","sourceIdentifier":"cve@mitre.org","published":"1999-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Digital Unix 4.0 has a buffer overflow in the inc program of the mh package."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E1E08495-C0C5-40A9-A8FF-834F5F6083B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*","matchCriteriaId":"781D13E2-35BB-4D58-A68F-86401D08D438"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*","matchCriteriaId":"07476CFD-859F-4AD7-8514-130E7A86BAE5"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0c:*:*:*:*:*:*:*","matchCriteriaId":"A5F097D7-CD52-44FC-851C-7DB42E57DCB8"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*","matchCriteriaId":"8C250283-4343-4569-A6EA-988FB7319AA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0e:*:*:*:*:*:*:*","matchCriteriaId":"32AE5D68-92A0-4950-A6FF-ECD5F56FDD90"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-027.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12121","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-027.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/12121","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0373","sourceIdentifier":"cve@mitre.org","published":"1999-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the \"Super\" utility in Debian GNU/Linux, and other operating systems, allows local users to execute commands as root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0373","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0373","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0403","sourceIdentifier":"cve@mitre.org","published":"1999-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A bug in Cyrix CPUs on Linux allows local users to perform a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cyrix:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"36B180B3-E7C9-45EE-976C-D329C783F956"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91821080015725&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91821080015725&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0459","sourceIdentifier":"cve@mitre.org","published":"1999-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local users can perform a denial of service in Alpha Linux, using MILO to force a reboot."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0459","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0362","sourceIdentifier":"cve@mitre.org","published":"1999-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WS_FTP server remote denial of service through cwd command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:ws_ftp_server:1.0.1eval:*:*:*:*:*:*:*","matchCriteriaId":"2FFFF21C-9F80-4BFC-B71C-E534F42020BF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:ws_ftp_server:1.0.2eval:*:*:*:*:*:*:*","matchCriteriaId":"EA1CFEE0-7707-4B3D-8E84-0C42F56F5666"}]}]}],"references":[{"url":"http://www.eeye.com/html/Research/Advisories/AD02021999.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/217","source":"cve@mitre.org"},{"url":"http://www.eeye.com/html/Research/Advisories/AD02021999.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/217","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0363","sourceIdentifier":"cve@mitre.org","published":"1999-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SuSE 5.2 PLP lpc program has a buffer overflow that leads to root compromise."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:plp:line_printer_control:*:*:*:*:*:*:*:*","matchCriteriaId":"E3A00539-B11C-4B4D-8EF1-CE42F5224B0F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/328","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/328","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0383","sourceIdentifier":"cve@mitre.org","published":"1999-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ACC Tigris allows public access without a login."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:acc:tigris:10.5.8:*:*:*:*:*:*:*","matchCriteriaId":"65BC8A0A-4070-4F0E-A6B1-CD2C9C01945B"}]}]}],"references":[{"url":"http://www.osvdb.org/267","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/183","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/267","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/183","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1171","sourceIdentifier":"cve@mitre.org","published":"1999-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IPswitch WS_FTP allows local users to gain additional privileges and modify or add mail accounts by setting the \"flags\" registry key to 1920."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EFEFE5A5-6589-4316-9C9F-2F8109696158"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:ws_ftp_server:1.0.1.e:*:*:*:*:*:*:*","matchCriteriaId":"D9BE1954-74C5-4A91-9C9A-C0647F281017"},{"vulnerable":true,"criteria":"cpe:2.3:a:progress:ws_ftp_server:1.0.2.e:*:*:*:*:*:*:*","matchCriteriaId":"3DE6789D-5DA5-489F-A900-F4788286ACE5"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=91816507920544&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/218","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91816507920544&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/218","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1453","sourceIdentifier":"cve@mitre.org","published":"1999-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4 allows remote attackers (malicious web site operators) to read the contents of the clipboard via the Internet WebBrowser ActiveX object."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=91979439932341&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/215","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://marc.info/?l=ntbugtraq&m=91979439932341&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/215","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-0365","sourceIdentifier":"cve@mitre.org","published":"1999-02-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The metamail package allows remote command execution using shell metacharacters that are not quoted in a mailcap entry."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:metainfo:metaip:3.1:*:*:*:*:*:*:*","matchCriteriaId":"E14CE1E9-2C59-4798-AF3A-924B6E1D8AA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:metainfo:sendmail:2.0:*:*:*:*:*:*:*","matchCriteriaId":"B4C8975F-66CD-458F-BBAD-F97E21881634"},{"vulnerable":true,"criteria":"cpe:2.3:a:metainfo:sendmail:2.5:*:*:*:*:*:*:*","matchCriteriaId":"E25900E0-2008-4AA8-9EEC-F1C0B13B6645"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0365","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0365","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1169","sourceIdentifier":"cve@mitre.org","published":"1999-02-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"nobo 1.2 allows remote attackers to cause a denial of service (crash) via a series of large UDP packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:flavio_veloso:nobo:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2","matchCriteriaId":"A83F305D-DDBB-48B2-AC94-690CA506F397"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12284","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/12284","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-1201","sourceIdentifier":"cve@mitre.org","published":"1999-02-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 95 and Windows 98 systems, when configured with multiple TCP/IP stacks bound to the same MAC address, allow remote attackers to cause a denial of service (traffic amplification) via a certain ICMP echo (ping) packet, which causes all stacks to send a ping response, aka TCP Chorusing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=91849617221319&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/225","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7542","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91849617221319&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/225","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7542","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0350","sourceIdentifier":"cve@mitre.org","published":"1999-02-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Race condition in the db_loader program in ClearCase gives local users root access by setting SUID bits."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rational_software:clearcase:3.2:*:*:*:*:*:*:*","matchCriteriaId":"9B2B1CFB-9ADB-4250-888D-80E885F3DD87"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0350","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0350","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0366","sourceIdentifier":"cve@mitre.org","published":"1999-02-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In some cases, Service Pack 4 for Windows NT 4.0 can allow access to network shares using a blank password, through a problem with a null NT hash value."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ214840","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-004","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ214840","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-004","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0367","sourceIdentifier":"cve@mitre.org","published":"1999-02-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetBSD netstat command allows local users to access kernel memory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"}]}]}],"references":[{"url":"http://www.osvdb.org/7571","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7571","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0368","sourceIdentifier":"cve@mitre.org","published":"1999-02-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in wuarchive ftpd (wu-ftpd) and ProFTPD lead to remote root access, a.k.a. palmetto."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:proftpd_project:proftpd:1.2_pre1:*:*:*:*:*:*:*","matchCriteriaId":"CE1015CB-9A33-48D5-861A-A1FC0D8D0FA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18:*:*:*:*:*:*:*","matchCriteriaId":"2D48DE48-5216-42AB-BEA8-EA490C5D4278"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*","matchCriteriaId":"4989799F-143A-45E5-A30C-9E3203649770"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"EED21F27-4ADA-42AC-B28E-F849F47D4043"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"6236FA51-E996-4E84-A8CC-2635A814CCC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"035FBF8B-EB91-4211-9979-8A9E913A54A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"B8BA72B4-C4AF-41C6-92ED-30B286E00EF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*","matchCriteriaId":"125918E7-53BB-407A-8D95-5D95CDF39A88"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*","matchCriteriaId":"CE0BBA4F-C61A-4A8E-A7E2-CE0DF76DF592"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0368","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0368","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0407","sourceIdentifier":"cve@mitre.org","published":"1999-02-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"By default, IIS 4.0 has a virtual directory /IISADMPWD which contains files that can be used as proxies for brute force password attacks, or to identify valid users on the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91983486431506&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92000623021036&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91983486431506&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92000623021036&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0353","sourceIdentifier":"cve@mitre.org","published":"1999-02-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.pcnfsd in HP gives remote root access by changing the permissions on the main printer spool directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-026.shtml","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9902-091","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-026.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9902-091","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0370","sourceIdentifier":"cve@mitre.org","published":"1999-02-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Sun Solaris and SunOS, man and catman contain vulnerabilities that allow overwriting arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/165","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/165","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0371","sourceIdentifier":"cve@mitre.org","published":"1999-02-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lynx allows a local user to overwrite sensitive files through /tmp symlinks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:N/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_kansas:lynx:*:*:*:*:*:*:*:*","versionEndIncluding":"2.7.1","matchCriteriaId":"9A682FFA-5C41-40BF-80EE-081604A77975"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0371","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0371","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1375","sourceIdentifier":"cve@mitre.org","published":"1999-02-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FileSystemObject (FSO) in the showfile.asp Active Server Page (ASP) allows remote attackers to read arbitrary files by specifying the name in the file parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=91877455626320&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/230","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=91877455626320&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/230","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0372","sourceIdentifier":"cve@mitre.org","published":"1999-02-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installer for BackOffice Server includes account names and passwords in a setup file (reboot.ini) which is not deleted."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:backoffice:4.0:*:*:*:*:*:*:*","matchCriteriaId":"60EAD9D1-B3E1-4DE3-9FCE-CBC2BC025561"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ217004","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-005","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ217004","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-005","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1203","sourceIdentifier":"cve@mitre.org","published":"1999-02-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multilink PPP for ISDN dialup users in Ascend before 4.6 allows remote attackers to cause a denial of service via a spoofed endpoint identifier."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ascend:multilink_ppp_for_isdn:*:*:*:*:*:*:*:*","versionEndIncluding":"4.6","matchCriteriaId":"490D93A3-D6B1-49F3-A24E-78DE9406740F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91868964203769&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91888117502765&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7498.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91868964203769&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91888117502765&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7498.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0404","sourceIdentifier":"cve@mitre.org","published":"1999-02-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:smartmax_software:mailmax:*:*:*:*:*:*:*:*","matchCriteriaId":"DB602C18-FC87-417F-B955-D4E1446A638C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0404","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0404","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0714","sourceIdentifier":"cve@mitre.org","published":"1999-02-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Compaq Tru64 UNIX edauth command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:3.2g:*:*:*:*:*:*:*","matchCriteriaId":"BD4B2280-5114-4CBD-9B06-221BD9CE4229"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E1E08495-C0C5-40A9-A8FF-834F5F6083B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0a:*:*:*:*:*:*:*","matchCriteriaId":"781D13E2-35BB-4D58-A68F-86401D08D438"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0b:*:*:*:*:*:*:*","matchCriteriaId":"07476CFD-859F-4AD7-8514-130E7A86BAE5"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0c:*:*:*:*:*:*:*","matchCriteriaId":"A5F097D7-CD52-44FC-851C-7DB42E57DCB8"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*","matchCriteriaId":"8C250283-4343-4569-A6EA-988FB7319AA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0e:*:*:*:*:*:*:*","matchCriteriaId":"32AE5D68-92A0-4950-A6FF-ECD5F56FDD90"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0714","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0714","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1260","sourceIdentifier":"cve@mitre.org","published":"1999-02-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"mSQL (Mini SQL) 2.0.6 allows remote attackers to obtain sensitive server information such as logged users, database names, and server version via the ServerStats query."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hughes:msql:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.6","matchCriteriaId":"826AF2F8-DAB3-4B7A-B9BF-41840FADA14F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91910115718150&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1777","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91910115718150&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1777","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0374","sourceIdentifier":"cve@mitre.org","published":"1999-02-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Debian GNU/Linux cfengine package is susceptible to a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0374","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0374","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0375","sourceIdentifier":"cve@mitre.org","published":"1999-02-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in webd in Network Flight Recorder (NFR) 2.0.2-Research allows remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_flight_recorder:network_flight_recorder:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.3","matchCriteriaId":"C82EC0C8-CE94-45E4-A265-FFDDE04CDE2A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0375","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0375","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1180","sourceIdentifier":"cve@mitre.org","published":"1999-02-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"O'Reilly WebSite 1.1e and Website Pro 2.0 allows remote attackers to execute arbitrary commands via shell metacharacters in an argument to (1) args.cmd or (2) args.bat."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:website:1.1e:*:*:*:*:*:*:*","matchCriteriaId":"2B146157-C821-410B-919E-856A5F1A8F2D"},{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:website_pro:*:*:*:*:*:*:*:*","versionEndIncluding":"2.4","matchCriteriaId":"3557C5A7-5359-4D3D-BBAE-0E5CA7CEA679"},{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:website_pro:2.0:*:*:*:*:*:*:*","matchCriteriaId":"B4814EF8-FC41-4CBE-A405-07FDE65D0C34"},{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:website_pro:2.1:*:*:*:*:*:*:*","matchCriteriaId":"6B476C94-D3B1-4959-A75E-921A3E8F5C71"}]}]}],"references":[{"url":"http://oliver.efri.hr/~crv/security/bugs/NT/buffer.html","source":"cve@mitre.org"},{"url":"http://www.tryc.on.ca/archives/bugtraq/1999_1/0612.html","source":"cve@mitre.org"},{"url":"http://oliver.efri.hr/~crv/security/bugs/NT/buffer.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.tryc.on.ca/archives/bugtraq/1999_1/0612.html","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"O'Reilly has corrected this issue in WebSite Professional 2.5, which is now available from:  http://website.oreilly.com"}},{"cve":{"id":"CVE-1999-0396","sourceIdentifier":"cve@mitre.org","published":"1999-02-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition between the select() and accept() calls in NetBSD TCP servers allows remote attackers to cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:N/A:P","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"36419DD6-0DB4-4BB6-A35F-D8FDB89402F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0396","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0396","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1060","sourceIdentifier":"cve@mitre.org","published":"1999-02-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Tetrix TetriNet daemon 1.13.16 allows remote attackers to cause a denial of service and possibly execute arbitrary commands by connecting to port 31457 from a host with a long DNS hostname."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tetrix:tetrinet:1.13.16:*:*:*:*:*:*:*","matchCriteriaId":"8DD10D50-353E-434F-9796-992001ADB7A3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91937090211855&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/340","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://marc.info/?l=bugtraq&m=91937090211855&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/340","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]}]}},{"cve":{"id":"CVE-1999-1405","sourceIdentifier":"cve@mitre.org","published":"1999-02-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"snap command in AIX before 4.3.2 creates the /tmp/ibmsupt directory with world-readable permissions and does not remove or clear the directory when snap -a is executed, which could allow local users to access the shadowed password file by creating /tmp/ibmsupt/general/passwd before root runs snap -a."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91936783009385&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91954824614013&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/375","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://marc.info/?l=bugtraq&m=91936783009385&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=91954824614013&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/375","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}],"evaluatorSolution":"Fixed in AIX 4.3 and 4.3.2\r\nAIX 4.3.x APAR: IX88263\r\nAIX 4.2.x APAR: IX88261"}},{"cve":{"id":"CVE-1999-0405","sourceIdentifier":"cve@mitre.org","published":"1999-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow in lsof allows local users to obtain root privilege."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"224CAC5B-96B0-4015-8106-63B486F37053"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","matchCriteriaId":"BF8F9B2F-E898-4F87-A245-32A41748587B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","matchCriteriaId":"314BA420-4C74-4060-8ACE-D7A7C041CF2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*","matchCriteriaId":"2EAD7613-A5B3-4621-B981-290C7C6B8BA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","matchCriteriaId":"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"451453AC-65FF-4E3B-9AC1-2DDB2E2182E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*","matchCriteriaId":"7716120D-5110-42B0-A574-9AA2AC8D3C32"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"CB4C8426-CAF2-4366-94C0-1BA1C544FB6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"5CC7D746-B98B-4FAF-B816-57222759A344"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"830D48B8-D21D-4D31-99A1-20C231804DBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5C0BBDD2-9FF9-4CB7-BCAF-D4AF15DC2C7C"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*","matchCriteriaId":"BCC94EF9-5872-402F-B2FC-06331A924BB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"}]}]}],"references":[{"url":"http://www.osvdb.org/3163","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3163","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1495","sourceIdentifier":"cve@mitre.org","published":"1999-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"xtvscreen in SuSE Linux 6.0 allows local users to overwrite arbitrary files via a symlink attack on the pic000.pnm file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12580","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/325","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1792","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12580","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/325","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1792","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0367","sourceIdentifier":"cve@mitre.org","published":"1999-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in eterm 0.8.8 in Debian GNU/Linux allows an attacker to gain root privileges."},{"lang":"es","value":"Vulnerabilidad en eterm 0.8.8 en Devial GNU/Linux permite a un atacante obtener privilegios de root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:michael_jennings:eterm:0.8.8:*:*:*:*:*:*:*","matchCriteriaId":"CE5961CA-6A25-421C-9856-899A7E442149"}]}]}],"references":[{"url":"http://www.debian.org/security/1999/19990218","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.debian.org/security/1999/19990218","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0406","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Digital Unix Networker program nsralist has a buffer overflow which allows local users to obtain root privilege."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:*:*:*:*:*:*:*:*","matchCriteriaId":"2FE14F36-1B9B-447F-BA87-D7780F33C975"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0406","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0406","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0412","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E701AB0D-E335-47DF-A0CA-607D5C6E9255"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/501","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/501","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0460","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Linux autofs module through long directory names allows local users to perform a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*","matchCriteriaId":"96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5E4A2912-12AC-4DF1-8023-A0B7DBE9A866"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*","matchCriteriaId":"BC74D465-3256-4D87-8F47-C4D7CEA6E2D4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/312","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/312","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0485","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can cause a system crash through ipintr() in ipq in OpenBSD."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:N/A:P","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"}]}]}],"references":[{"url":"http://www.osvdb.org/7558","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7558","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1101","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Kabsoftware Lydia utility uses weak encryption to store user passwords in the lydia.ini file, which allows local users to easily decrypt the passwords and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kab_software:lydia:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2","matchCriteriaId":"8B027B36-D8C1-4093-8D41-C0B58CD05C39"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12618","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/12618","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-1255","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hyperseek allows remote attackers to modify the hyperseek configuration by directly calling the admin.cgi program with an edit_file action parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ccs_network:hyperseek_search_engine:*:*:*:*:*:*:*:*","versionEndIncluding":"2000","matchCriteriaId":"78378424-44A3-49DB-BDA8-F6AE1B6C028F"}]}]}],"references":[{"url":"http://www.rootshell.com/archive-j457nxiqi3gq59dv/199902/hyperseek.txt.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1914","source":"cve@mitre.org"},{"url":"http://www.rootshell.com/archive-j457nxiqi3gq59dv/199902/hyperseek.txt.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1914","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1372","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Triactive Remote Manager with Basic authentication enabled stores the username and password in cleartext in registry keys, which could allow local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:triactive:remote_management:*:*:*:*:*:*:*:*","matchCriteriaId":"D2FE8FAC-7CE9-4965-8F3A-3F51AE963548"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91966339502073&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91966339502073&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1482","sourceIdentifier":"cve@mitre.org","published":"1999-02-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SVGAlib zgv 3.0-7 and earlier allows local users to gain root access via a privilege leak of the iopl(3) privileges to child processes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:svgalib:zgv:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.7","matchCriteriaId":"143C891B-8B11-4FCF-8FC1-0FCA3BDEC20D"}]}]}],"references":[{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-02-15&msg=Pine.LNX.3.96.990219175605.9622A-100000%40ferret.lmh.ox.ac.uk","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-02-15&msg=Pine.LNX.3.96.990219175605.9622A-100000%40ferret.lmh.ox.ac.uk","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0376","sourceIdentifier":"cve@mitre.org","published":"1999-02-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local users in Windows NT can obtain administrator privileges by changing the KnownDLLs list to reference malicious programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D0D4EAC2-A948-461F-B5DD-0AE73CF05D29"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-006","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-006","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1168","sourceIdentifier":"cve@mitre.org","published":"1999-02-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"install.iss installation script for Internet Security Scanner (ISS) for Linux, version 5.3, allows local users to change the permissions of arbitrary files via a symlink attack on a temporary file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:iss:internet_security_scanner:5.3:*:linux:*:*:*:*:*","matchCriteriaId":"F960A59D-4D00-4AD0-85F1-6B457DAB547E"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12640","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/12640","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-1049","sourceIdentifier":"cve@mitre.org","published":"1999-02-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ARCserve NT agents use weak encryption (XOR) for passwords, which allows remote attackers to sniff the authentication request to port 6050 and decrypt the password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:arcserve_backup:*:*:*:*:*:*:*:*","versionEndIncluding":"6.5","matchCriteriaId":"06562367-E088-443A-B2DE-F75A71241E18"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91972006211238&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91972006211238&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0377","sourceIdentifier":"cve@mitre.org","published":"1999-02-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Process table attack in Unix systems allows a remote attacker to perform a denial of service by filling a machine's process tables through multiple connections to network services."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:unix:unix:*:*:*:*:*:*:*:*","matchCriteriaId":"F7A7C398-5356-45D6-AA5C-53E63BC88DCA"}]}]}],"references":[{"url":"http://www.securitytracker.com/id/1033881","source":"cve@mitre.org"},{"url":"http://www.securitytracker.com/id/1033881","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0378","sourceIdentifier":"cve@mitre.org","published":"1999-02-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"InterScan VirusWall for Solaris doesn't scan files for viruses when a single HTTP request includes two GET commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:*:*:*:*:*:*:*:*","matchCriteriaId":"3F3D7981-9319-4EAE-B4CB-A12DB51C0412"}]}]}],"references":[{"url":"http://www.osvdb.org/6167","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6167","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0379","sourceIdentifier":"cve@mitre.org","published":"1999-02-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Taskpads allows remote web sites to execute commands on the visiting user's machine via certain methods that are marked as Safe for Scripting."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:backoffice_resource_kit:2.0:*:*:*:*:*:*:*","matchCriteriaId":"EEC012B1-DF28-4CC3-852B-99CADFEC8492"}]}]}],"references":[{"url":"http://www.osvdb.org/1019","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/498","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-007","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1019","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/498","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-007","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0441","sourceIdentifier":"cve@mitre.org","published":"1999-02-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can perform a denial of service in WinGate machines using a buffer overflow in the Winsock Redirector Service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qbik:wingate:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4C7BC4C8-FB7B-4A88-B97B-984D9AA8EA1D"}]}]}],"references":[{"url":"http://www.eeye.com/html/Research/Advisories/AD02221999.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/509","source":"cve@mitre.org"},{"url":"http://www.eeye.com/html/Research/Advisories/AD02221999.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/509","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0484","sourceIdentifier":"cve@mitre.org","published":"1999-02-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in OpenBSD ping."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","matchCriteriaId":"CA3CDD3C-DBA6-4BA2-967D-AD746822F3CF"}]}]}],"references":[{"url":"http://www.osvdb.org/6130","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6130","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1247","sourceIdentifier":"cve@mitre.org","published":"1999-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in HP Camera component of HP DCE/9000 in HP-UX 9.x allows attackers to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:9:*:*:*:*:*:*:*","matchCriteriaId":"5E54D276-792B-40D2-B39B-5050028DE988"}]}]}],"references":[{"url":"http://packetstormsecurity.org/advisories/hpalert/006","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2061","source":"cve@mitre.org"},{"url":"http://packetstormsecurity.org/advisories/hpalert/006","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2061","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0380","sourceIdentifier":"cve@mitre.org","published":"1999-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SLMail 3.1 and 3.2 allows local users to access any file in the NTFS file system when the Remote Administration Service (RAS) is enabled by setting a user's Finger File to point to the target file, then running finger on the user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seattle_lab_software:slmail:3.0.2421:*:*:*:*:*:*:*","matchCriteriaId":"B582E8B5-0BF7-48C6-B92A-C617D1B9F576"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91996412724720&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91999015212415&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92110501504997&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/497","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5392","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91996412724720&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=91999015212415&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92110501504997&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/497","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5392","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0408","sourceIdentifier":"cve@mitre.org","published":"1999-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Files created from interactive shell sessions in Cobalt RaQ microservers (e.g. .bash_history) are world readable, and thus are accessible from the web server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:cobalt_raq:*:*:*:*:*:*:*:*","matchCriteriaId":"4F6F4069-9641-4D10-8C83-51141AFF221B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/337","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/337","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0483","sourceIdentifier":"cve@mitre.org","published":"1999-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OpenBSD crash using nlink value in FFS and EXT2FS filesystems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","matchCriteriaId":"CA3CDD3C-DBA6-4BA2-967D-AD746822F3CF"}]}]}],"references":[{"url":"http://www.osvdb.org/6129","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6129","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0381","sourceIdentifier":"cve@mitre.org","published":"1999-02-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"super 3.11.6 and other versions have a buffer overflow in the syslog utility which allows a local user to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/342","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.990225011801.12757A-100000%40eleet","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/342","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.990225011801.12757A-100000%40eleet","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0221","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service of Ascend routers through port 150 (remote administration)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:lucent:ascend_routers:*:*:*:*:*:*:*:*","matchCriteriaId":"549685E5-F9DE-48A0-BB41-EB4580FD8ECD"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0221","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0221","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0222","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Cisco IOS web server allows attackers to reboot the router using a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*","matchCriteriaId":"EF6E96F8-E95E-4F3A-8CAF-936327BA3E54"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/60159","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/60159","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0223","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris syslogd crashes when receiving a message from a host that doesn't have an inverse DNS entry."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"}]}]}],"references":[{"url":"http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?patchid=103291&collection=fpatches","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1878","source":"cve@mitre.org"},{"url":"http://sunsolve.Sun.COM/pub-cgi/retrieve.pl?patchid=103291&collection=fpatches","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1878","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0261","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netmanager Chameleon SMTPd has several buffer overflows that cause a crash."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.insecure.org/sploits/netmanage.chameleon.overflows.html","source":"cve@mitre.org"},{"url":"http://www.insecure.org/sploits/netmanage.chameleon.overflows.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0386","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Personal Web Server and FrontPage Personal Web Server in some Windows systems allows a remote attacker to read files on the server by using a nonstandard URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*","matchCriteriaId":"0951E183-2BFE-4B19-9F06-107B5E22DBC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:personal_web_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"9E075F89-BC5D-48D8-8CA1-B56C2CAD50F6"}]}]}],"references":[{"url":"http://www.osvdb.org/111","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-010","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/111","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-010","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0413","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow in the SGI X server allows local users to gain root access through the X server font path."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19990301-01-PX","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19990301-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0414","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Linux before version 2.0.36, remote attackers can spoof a TCP connection and pass data to the application layer before fully establishing the connection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.30:*:*:*:*:*:*:*","matchCriteriaId":"29AC849E-7D4E-4C00-8BD0-672F413A80B5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*","matchCriteriaId":"B03D22C9-94C6-4AC5-AAD0-15F06BCC5CA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*","matchCriteriaId":"541B4ED8-E970-4C67-B5AF-7DE5B7F754D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*","matchCriteriaId":"1E55F8A8-1ABD-4760-9074-353BBAEE005B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0414","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0414","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0419","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When the Microsoft SMTP service attempts to send a message to a server and receives a 4xx error code, it quickly and repeatedly attempts to redeliver the message, causing a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0419","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0419","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0426","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default permissions of /dev/kmem in Linux versions before 2.0.36 allows IP spoofing."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-276"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0426","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0429","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Lotus Notes 4.5 client may send a copy of encrypted mail in the clear across the network if the user does not set the \"Encrypt Saved Mail\" preference."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*","matchCriteriaId":"8376F4C1-44AE-42A8-A087-E3845FD2A0A8"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92221437025743&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92241547418689&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92246997917866&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92249282302994&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92221437025743&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92241547418689&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92246997917866&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92249282302994&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0430","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Catalyst LAN switches running Catalyst 5000 supervisor software allows remote attackers to perform a denial of service by forcing the supervisor module to reload."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_12xx_supervisor_software:4.29:*:*:*:*:*:*:*","matchCriteriaId":"46FC1323-E34A-4263-8B7E-87A3A7BCAC14"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:1.0:*:*:*:*:*:*:*","matchCriteriaId":"CF25B831-1F07-4DFB-93AF-D08419D17A5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"176EBD41-3021-42D4-974F-6C80DEB2463E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.501:*:*:*:*:*:*:*","matchCriteriaId":"C3BBD6C0-3377-4145-8136-645808680986"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_29xx_supervisor_software:2.1.502:*:*:*:*:*:*:*","matchCriteriaId":"97D89F9B-F082-4C7D-80BF-A39DE234BBE4"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:1.0:*:*:*:*:*:*:*","matchCriteriaId":"DCC1EA92-6A3B-46B4-8779-9B401693FF14"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"7A734789-8584-4231-AF14-BCE70F2BB43C"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.501:*:*:*:*:*:*:*","matchCriteriaId":"41A72040-25D5-4AE3-BC44-BDF9B380E8E6"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:catalyst_5xxx_supervisor_software:2.1.502:*:*:*:*:*:*:*","matchCriteriaId":"C333C250-9275-4B25-94C2-A00BA4EECD95"}]}]}],"references":[{"url":"http://www.osvdb.org/1103","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1103","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0431","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux 2.2.3 and earlier allow a remote attacker to perform an IP fragmentation attack, causing a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.3","matchCriteriaId":"B02C3FC5-70D5-4471-9B87-C23DE94D7C1D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.1.89:*:*:*:*:*:*:*","matchCriteriaId":"15004105-9A55-4592-96D6-3FF539EC7513"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"146F7A77-A950-4CAD-BDA9-C239696F569D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*","matchCriteriaId":"AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*","matchCriteriaId":"0EEF4480-D50B-464C-AE39-A12455DBC99F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.13:*:*:*:*:*:*:*","matchCriteriaId":"6BBFD0DB-0A18-4545-9B4B-697AAC11E9C5"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*","matchCriteriaId":"15928E10-7D41-45B2-87D6-8AA10190A8EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.15:*:*:*:*:*:*:*","matchCriteriaId":"C18E13C4-F42D-4168-B25E-544E1549C46B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.15:pre16:*:*:*:*:*:*","matchCriteriaId":"1C4B2ABB-0283-4532-9E29-B37BFF5FDFB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.15_pre20:*:*:*:*:*:*:*","matchCriteriaId":"C4DADA29-DCD3-44C4-9BDB-B881D6FCE3A3"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.16:*:*:*:*:*:*:*","matchCriteriaId":"F0DB9B7C-3608-44E3-AE47-D231D1F7B8EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.16:pre6:*:*:*:*:*:*","matchCriteriaId":"4BD794C6-11F5-4A2B-9A3C-E03069A1526B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0431","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"This problem was fixed in Linux kernel 2.2.4 and later releases."}},{"cve":{"id":"CVE-1999-0432","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ftp on HP-UX 11.00 allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-094","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0435","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MC/ServiceGuard and MC/LockManager in HP-UX allows local users to gain privileges through SAM."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0435","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0436","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Domain Enterprise Server Management System (DESMS) in HP-UX allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:desms:*:*:*:*:*:*:*:*","matchCriteriaId":"F565AAAE-5ACE-42D2-9DA6-281FE3F76DA5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-095","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0437","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can perform a denial of service in WebRamp systems by sending a malicious string to the HTTP port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp:*:*:*:*:*:*:*:*","matchCriteriaId":"F73D838D-0F7C-4BED-9F48-B80FE5E66820"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0437","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0438","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can perform a denial of service in WebRamp systems by sending a malicious UDP packet to port 5353, changing its IP address."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*","matchCriteriaId":"DC097E3D-FB10-469C-A303-D72D5E009FFE"},{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*","matchCriteriaId":"697F9986-CDD4-479F-A375-53FF40C2C419"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0438","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0440","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The byte code verifier component of the Java Virtual Machine (JVM) allows remote execution through malicious web pages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"05CFEB93-B230-473E-A6D0-73CA0C48CB9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.01:*:*:*:*:*:*:*","matchCriteriaId":"60AA08F1-9932-404D-830E-E6D126FC732B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.02:*:*:*:*:*:*:*","matchCriteriaId":"C2FBC98E-49CF-48F1-9206-DDE8166AA8E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.03:*:*:*:*:*:*:*","matchCriteriaId":"E57BB283-31F4-487A-87CA-A251BFC5133C"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.04:*:*:*:*:*:*:*","matchCriteriaId":"8B4D5F1E-DD1B-4CCE-B16D-05AB2DEBCB18"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.05:*:*:*:*:*:*:*","matchCriteriaId":"E20267FF-FCF8-42BF-9CF1-127FF856C6FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"F7EC6F62-37FF-46DD-997C-A4D77182BBEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.06:*:*:*:*:*:*:*","matchCriteriaId":"D5904FD1-9806-4C73-A4E8-98C1F8F078EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.07:*:*:*:*:*:*:*","matchCriteriaId":"431D7EED-1152-4245-92B9-023A4AC88EA8"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.08:*:*:*:*:*:*:*","matchCriteriaId":"04BBF8B2-8378-4CA3-B8D4-4ED5D7B8A674"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.61:*:*:*:*:*:*:*","matchCriteriaId":"0B3EFA3B-5DE7-40D0-960D-283491163E74"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*","matchCriteriaId":"5DDA9F90-5D16-4E04-B285-D32C362279C6"}]}]}],"references":[{"url":"http://java.sun.com/pr/1999/03/pr990329-01.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92333596624452&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1939","source":"cve@mitre.org"},{"url":"http://java.sun.com/pr/1999/03/pr990329-01.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92333596624452&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1939","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0476","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A weak encryption algorithm is used for passwords in SCO TermVision, allowing them to be easily decrypted by a local user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:*:*:*:*:*:*:*:*","matchCriteriaId":"B5F14C63-9596-4675-B217-F22F8A18CD1B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0476","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0476","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0479","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service Netscape Enterprise Server with VirtualVault on HP-UX VVOS systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*","matchCriteriaId":"3577B789-DBB6-413D-B964-B32FE3E8CD8B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-092","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9903-092","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1046","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in IMonitor in IMail 5.0 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 8181."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EFEFE5A5-6589-4316-9C9F-2F8109696158"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92038879607336&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/504","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1897","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92038879607336&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/504","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1897","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0371","sourceIdentifier":"cve@mitre.org","published":"1999-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The libmediatool library used for the KDE mediatool allows local users to create arbitrary files via a symlink attack."},{"lang":"es","value":"La librería libmediatool usada para el mediatool de KDE permite a usuarios locales crear ficheros arbitrarios mediante un ataque de enlaces simbólicos (symlink attack)"}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:N/I:P/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.1:*:*:*:*:*:*:*","matchCriteriaId":"55B38F8C-9451-441B-BCD8-E41C1A2231DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D04A4717-229D-4E20-8FD2-DC13757B0AC5"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-005.0.txt","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1269","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-005.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1269","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1551","sourceIdentifier":"cve@mitre.org","published":"1999-03-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Ipswitch IMail Service 5.0 allows an attacker to cause a denial of service (crash) and possibly execute arbitrary commands via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EFEFE5A5-6589-4316-9C9F-2F8109696158"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:*","matchCriteriaId":"9EADF489-0420-4C47-9F73-78114C2042F3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92038879607336&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/505","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1898","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92038879607336&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/505","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1898","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0409","sourceIdentifier":"cve@mitre.org","published":"1999-03-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in gnuplot in Linux version 3.5 allows local users to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:3.5:*:*:*:*:*:*:*","matchCriteriaId":"6542B24A-901D-4DAC-B2FF-A60FE4EA62F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/319","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/319","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1256","sourceIdentifier":"cve@mitre.org","published":"1999-03-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Oracle Database Assistant 1.0 in Oracle 8.0.3 Enterprise Edition stores the database master password in plaintext in the spoolmain.log file when a new database is created, which allows local users to obtain the password from that file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_assistant:1.0:*:*:*:*:*:*:*","matchCriteriaId":"E405BD60-DB79-45B9-BA62-2DDB29B580B3"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92056752115116&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12744","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1902","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92056752115116&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/12744","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1902","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0019","sourceIdentifier":"cve@mitre.org","published":"1999-03-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IMail POP3 daemon uses weak encryption, which allows local users to read files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:2006:*:*:*:*:*:*:*","matchCriteriaId":"81B286D0-4168-41FF-AC1F-4E65C3AD7DC0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0019","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0019","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0410","sourceIdentifier":"cve@mitre.org","published":"1999-03-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The cancel command in Solaris 2.6 (i386) has a buffer overflow that allows local users to obtain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/293","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/293","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0411","sourceIdentifier":"cve@mitre.org","published":"1999-03-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Several startup scripts in SCO OpenServer Enterprise System v 5.0.4p, including S84rpcinit, S95nis, S85tcp, and S89nfs, are vulnerable to a symlink attack, allowing a local user to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7363FF35-7C67-40DC-AD38-74FD6264BF5A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5:*:*:*:*:*:*:*","matchCriteriaId":"4EDA6C83-76C9-44F1-94A2-1CBCC7DBBB00"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0411","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0411","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0418","sourceIdentifier":"cve@mitre.org","published":"1999-03-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in SMTP applications such as Sendmail, when a remote attacker (e.g. spammer) uses many \"RCPT TO\" commands in the same connection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92100018214316&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92100018214316&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1254","sourceIdentifier":"cve@mitre.org","published":"1999-03-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92099515709467&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1947","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92099515709467&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1947","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1371","sourceIdentifier":"cve@mitre.org","published":"1999-03-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in /usr/bin/write in Solaris 2.6 and 7 allows local users to gain privileges via a long string in the terminal name argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92100752221493&w=2","source":"cve@mitre.org"},{"url":"http://www.securiteam.com/exploits/5ZP0O1P35O.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7546","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92100752221493&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securiteam.com/exploits/5ZP0O1P35O.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7546","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1567","sourceIdentifier":"cve@mitre.org","published":"1999-03-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Seapine Software TestTrack server allows a remote attacker to cause a denial of service (high CPU) via (1) TestTrackWeb.exe and (2) ttcgi.exe by connecting to port 99 and disconnecting without sending any data."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seapine_software:testtrack:*:*:*:*:*:*:*:*","matchCriteriaId":"DEF95D4B-F5F1-4655-A617-3071E01904FC"}]}]}],"references":[{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9903&L=NTBUGTRAQ&P=R1215","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9906&L=NTBUGTRAQ&P=R1680","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1948","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9903&L=NTBUGTRAQ&P=R1215","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9906&L=NTBUGTRAQ&P=R1680","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1948","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Seapine Software","comment":"This issue was originally reported on 3/8/1999 and Seapine fixed the issue on 3/23/1999. This fix became available with the release of TestTrack Workgroup 1.8.  We would also like to note that the issue existed in the older TestTrack Workgroup product, which was discontinued in 2002.  This problem never existed in the TestTrack Pro product.","lastModified":"2010-07-22T00:00:00"}]}},{"cve":{"id":"CVE-1999-0417","sourceIdentifier":"cve@mitre.org","published":"1999-03-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"64 bit Solaris 7 procfs allows local users to perform a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.osvdb.org/1001","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/448","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1001","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/448","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0415","sourceIdentifier":"cve@mitre.org","published":"1999-03-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The HTTP server in Cisco 7xx series routers 3.2 through 4.2 is enabled by default, which allows remote attackers to change the router's configuration."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:cisco_7xx_routers:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"88BA0771-C31C-45E4-8163-4D6F87F703D2"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:cisco_7xx_routers:3.2:*:*:*:*:*:*:*","matchCriteriaId":"08135D2D-7873-4C56-80D7-D43FD1850936"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/j-034.shtml","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/770/7xxconn-pub.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-034.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cisco.com/warp/public/770/7xxconn-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0416","sourceIdentifier":"cve@mitre.org","published":"1999-03-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Cisco 7xx series routers allows a remote attacker to cause a system reload via a TCP connection to the router's TELNET port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:cisco_7xx_routers:*:*:*:*:*:*:*:*","matchCriteriaId":"A4EC01F9-0690-486A-AE1A-46EC8226CE0F"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/j-034.shtml","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/770/7xxconn-pub.shtml","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-034.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cisco.com/warp/public/770/7xxconn-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1526","sourceIdentifier":"cve@mitre.org","published":"1999-03-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Auto-update feature of Macromedia Shockwave 7 transmits a user's password and hard disk information back to Macromedia."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:macromedia:shockwave_flash_plugin:7.0:*:*:*:*:*:*:*","matchCriteriaId":"4E1EDE88-8AF2-4E33-9E9D-526C9D75FC3B"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12842","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1931","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12842","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1931","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0382","sourceIdentifier":"cve@mitre.org","published":"1999-03-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The screen saver in Windows NT does not verify that its security context has been changed properly, allowing attackers to run programs with elevated privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp1:*:*:*:*:*:*","matchCriteriaId":"EF8BECF6-3C33-4D8C-B54E-A0D2F3295E81"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp2:*:*:*:*:*:*","matchCriteriaId":"828B4519-24D8-45A7-8448-D5FF6C83A2C3"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp3:*:*:*:*:*:*","matchCriteriaId":"F495AF7A-CC31-4045-BACC-902950C80ABF"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp4:*:*:*:*:*:*","matchCriteriaId":"68DFA54C-3DB9-4A94-A446-CF28671FE4F6"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:sp5:*:*:*:*:*:*","matchCriteriaId":"55A2AC4C-6B85-4B60-BFE1-C9588C5973B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-008","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-008","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0420","sourceIdentifier":"cve@mitre.org","published":"1999-03-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"umapfs allows local users to gain root privileges by changing their uid through a malicious mount_umap program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netbsd:umapfs:*:*:*:*:*:*:*:*","matchCriteriaId":"FD5FA59F-5682-4845-AEB8-CCE485FE1BDD"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0420","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0420","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0421","sourceIdentifier":"cve@mitre.org","published":"1999-03-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"During a reboot after an installation of Linux Slackware 3.6, a remote attacker can obtain root access by logging in to the root account without a password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*","matchCriteriaId":"CE0BBA4F-C61A-4A8E-A7E2-CE0DF76DF592"}]}]}],"references":[{"url":"http://www.osvdb.org/981","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/338","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/981","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/338","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0422","sourceIdentifier":"cve@mitre.org","published":"1999-03-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In some cases, NetBSD 1.3.3 mount allows local users to execute programs in some file systems that have the \"noexec\" flag set."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0422","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0422","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0462","sourceIdentifier":"cve@mitre.org","published":"1999-03-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"suidperl in Linux Perl does not check the nosuid mount option on file systems, allowing local users to gain root access by placing a setuid script in a mountable file system, e.g. a CD-ROM or floppy disk."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*","matchCriteriaId":"BCC94EF9-5872-402F-B2FC-06331A924BB2"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/339","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/339","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0424","sourceIdentifier":"cve@mitre.org","published":"1999-03-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"talkback in Netscape 4.5 allows a local user to overwrite arbitrary files of another user whose Netscape crashes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0424","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0424","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0425","sourceIdentifier":"cve@mitre.org","published":"1999-03-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"talkback in Netscape 4.5 allows a local user to kill an arbitrary process of another user whose Netscape crashes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0425","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0433","sourceIdentifier":"cve@mitre.org","published":"1999-03-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"XFree86 startx command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:x11r6:3.3.3:*:*:*:*:*:*:*","matchCriteriaId":"C104B02C-3F3B-4DB4-8A1D-65A7DAA380EB"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*","matchCriteriaId":"06F2131E-F9F2-4E65-B95C-B52DB25C69F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*","matchCriteriaId":"125918E7-53BB-407A-8D95-5D95CDF39A88"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*","matchCriteriaId":"CE0BBA4F-C61A-4A8E-A7E2-CE0DF76DF592"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"CC3B1DD9-10B5-40FE-AE56-D068C41653DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5C0BBDD2-9FF9-4CB7-BCAF-D4AF15DC2C7C"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0433","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0482","sourceIdentifier":"cve@mitre.org","published":"1999-03-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OpenBSD kernel crash through TSS handling, as caused by the crashme program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:*:*:*:*:*:*:*:*","matchCriteriaId":"CA3CDD3C-DBA6-4BA2-967D-AD746822F3CF"}]}]}],"references":[{"url":"http://www.osvdb.org/7557","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7557","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0428","sourceIdentifier":"cve@mitre.org","published":"1999-03-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OpenSSL and SSLeay allow remote attackers to reuse SSL sessions and bypass access controls."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-384"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openssl:openssl:*:*:*:*:*:*:*:*","versionEndExcluding":"0.9.2b","matchCriteriaId":"E717640E-3476-48AC-8674-7E8F080C7EB8"}]}]}],"references":[{"url":"http://www.osvdb.org/3936","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.osvdb.org/3936","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}},{"cve":{"id":"CVE-1999-0481","sourceIdentifier":"cve@mitre.org","published":"1999-03-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in \"poll\" in OpenBSD."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"}]}]}],"references":[{"url":"http://www.osvdb.org/7556","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7556","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1370","sourceIdentifier":"cve@mitre.org","published":"1999-03-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The setup wizard (ie5setup.exe) for Internet Explorer 5.0 disables (1) the screen saver, which could leave the system open to users with physical access if a failure occurs during an unattended installation, and (2) the Task Scheduler Service, which might prevent the scheduled execution of security-critical programs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92220197414799&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92220197414799&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1397","sourceIdentifier":"cve@mitre.org","published":"1999-03-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Index Server 2.0 on IIS 4.0 stores physical path information in the ContentIndex\\Catalogs subkey of the AllowedPaths registry key, whose permissions allows local and remote users to obtain the physical paths of directories that are being indexed."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D56759FD-DE03-4E90-8688-B6A49AA24F25"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92242671024118&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92223293409756&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7559.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/476","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92242671024118&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92223293409756&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7559.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/476","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0153","sourceIdentifier":"cve@mitre.org","published":"1999-03-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FrontPage Personal Web Server (PWS) allows remote attackers to read files via a .... (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*","matchCriteriaId":"0951E183-2BFE-4B19-9F06-107B5E22DBC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:personal_web_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"9E075F89-BC5D-48D8-8CA1-B56C2CAD50F6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/989","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000801bf780a%249ad4b2e0%240100007f%40localhost","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/989","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000801bf780a%249ad4b2e0%240100007f%40localhost","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0434","sourceIdentifier":"cve@mitre.org","published":"1999-03-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"XFree86 xfs command is vulnerable to a symlink attack, allowing local users to create files in restricted directories, possibly allowing them to gain privileges or cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*","matchCriteriaId":"A5C77FA7-C977-4223-B6AC-91B82C45129C"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*","matchCriteriaId":"D3067DBB-FBA1-48E9-9EC8-5A8D74B9F2D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*","matchCriteriaId":"BCC94EF9-5872-402F-B2FC-06331A924BB2"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/359","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/359","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1559","sourceIdentifier":"cve@mitre.org","published":"1999-03-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Xylan OmniSwitch before 3.2.6 allows remote attackers to bypass the login prompt via a CTRL-D (control d) character, which locks other users out of the switch because it only supports one session at a time."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:alcatel:omniswitch:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2.4","matchCriteriaId":"E4EF8121-C699-4F9C-A320-C13C444B2730"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92299263017061&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2064","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92299263017061&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2064","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0443","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Patrol management software allows a remote attacker to conduct a replay attack to steal the administrator password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"6C07DD3D-C806-4218-BBC8-B859940D9330"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/13204","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/13204","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0445","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","matchCriteriaId":"8F86F790-6247-42F2-9487-3D60A2842F52"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*","matchCriteriaId":"53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*","matchCriteriaId":"AE210B04-7ECD-419C-9258-0F619A353A8A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*","matchCriteriaId":"3B467741-B277-4128-9804-E13ED23FD310"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*","matchCriteriaId":"5E7EE856-9CE7-49FD-8ADC-05C580CD54A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*","matchCriteriaId":"5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*","matchCriteriaId":"C48466C4-5A1E-4C71-8822-32D387B36B8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*","matchCriteriaId":"08E23131-D207-4D98-96D5-2B71FF792604"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*","matchCriteriaId":"1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*","matchCriteriaId":"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*","matchCriteriaId":"2C398460-3F38-4AA7-A4B1-FD8A01588DB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*","matchCriteriaId":"CA7F94E8-86FC-456B-A7BB-57953F67F754"}]}]}],"references":[{"url":"http://www.osvdb.org/1104","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1104","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0447","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local users can gain privileges using the debug utility in the MPE/iX operating system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:mpe_ix:*:*:*:*:*:*:*:*","matchCriteriaId":"4C767768-3F0A-4E14-A2DF-0967A1A5BBE6"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBMP9904-006","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0467","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Webcom CGI Guestbook programs wguest.exe and rguest.exe allow a remote attacker to read arbitrary files using the \"template\" parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webcom:cgi_guestbook:*:*:*:*:*:*:*:*","matchCriteriaId":"A1E39DAD-2870-4BB8-A146-061F95AC2D0B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0467","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0467","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0469","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.0 allows window spoofing, allowing a remote attacker to spoof a legitimate web site and capture information from the client."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0469","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0469","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0480","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local attackers can conduct a denial of service in Midnight Commander 4.x with a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:midnight_commander:midnight_commander:4:*:*:*:*:*:*:*","matchCriteriaId":"9BBD7E36-FFE4-46FC-89DE-CD7B293A9676"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0480","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0480","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0605","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An incorrect configuration of the Order Form 1.0 shopping cart  CGI program could disclose private information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:austin_contract_computing:merchant_order_form:1.0:*:*:*:*:*:*:*","matchCriteriaId":"8D202FCD-86B6-413D-8C81-ADC9FAC9A4FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:austin_contract_computing:merchant_order_form:1.2:*:*:*:*:*:*:*","matchCriteriaId":"A686C8B5-4155-4406-880E-3FC6CCDA9620"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0606","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An incorrect configuration of the EZMall 2000 shopping cart  CGI program \"mall2000.cgi\" could disclose private information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seaside_enterprises:ezmall:2000:*:*:*:*:*:*:*","matchCriteriaId":"22F8CC0D-AF30-49FB-9C89-6C54B0A725D2"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0608","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An incorrect configuration of the PDG Shopping Cart CGI program \"shopper.cgi\" could disclose private information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pdgsoft:pdg_shopping_cart:1.5:*:*:*:*:*:*:*","matchCriteriaId":"90887F5A-23E7-4A0B-9E5A-811878D09A82"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"cve@mitre.org"},{"url":"http://www.pdgsoft.com/Security/security.html.","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3857","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.pdgsoft.com/Security/security.html.","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3857","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0609","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An incorrect configuration of the SoftCart CGI program \"SoftCart.exe\" could disclose private information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mercantec:softcart:*:*:*:*:*:*:*:*","matchCriteriaId":"BA1BA08E-010F-4FA3-8986-F89ECE098697"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0610","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An incorrect configuration of the Webcart CGI program could disclose private information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mountain_network_systems:webcart:*:*:*:*:*:*:*:*","matchCriteriaId":"4A6C61C6-FD77-4B4B-BF10-0ED456C0580F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0921","sourceIdentifier":"cve@mitre.org","published":"1999-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BMC Patrol allows any remote attacker to flood its UDP port, causing a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"7B1CDFC2-10EC-4955-B254-5A22F910EFE8"}]}]}],"references":[{"url":"http://www.iss.net/security_center/static/4291.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/13204","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1879","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/4291.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/13204","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1879","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0439","sourceIdentifier":"cve@mitre.org","published":"1999-04-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in procmail before version 3.12 allows remote or local attackers to execute commands via expansions in the procmailrc configuration file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*","versionEndIncluding":"3.12","matchCriteriaId":"7FE4462E-5A4D-4DD3-A3B3-2C77EFA56A3E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*","matchCriteriaId":"4EC3F7E5-5D49-471B-A705-ADD2642E5B46"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0439","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0474","sourceIdentifier":"cve@mitre.org","published":"1999-04-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ICQ Webserver allows remote attackers to use .. to access arbitrary files outside of the user's personal directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:99a_2.13build1700:*:*:*:*:*:*:*","matchCriteriaId":"CAB01C3F-E8A0-4A0E-A020-228E22A7BD43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0474","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0474","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0475","sourceIdentifier":"cve@mitre.org","published":"1999-04-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A race condition in how procmail handles .procmailrc files allows a local user to read arbitrary files available to the user who is running procmail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:N/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:procmail:procmail:*:*:*:*:*:*:*:*","matchCriteriaId":"49F40393-4833-4D41-9D16-99DFEDABCE17"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0475","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0475","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1245","sourceIdentifier":"cve@mitre.org","published":"1999-04-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"vacm ucd-snmp SNMP server, version 3.52, does not properly disable access to the public community string, which could allow remote attackers to obtain sensitive information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ucd-snmp:ucd-snmp:3.52:*:*:*:*:*:*:*","matchCriteriaId":"3D376CDE-B6B8-4F7B-A1D7-71DAB61CEA45"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2086","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2086","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"This vulnerability was fixed in version 3.6 of ucd-snmpd."}},{"cve":{"id":"CVE-1999-0472","sourceIdentifier":"cve@mitre.org","published":"1999-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SNMP default community name \"public\" is not properly removed in NetApps C630 Netcache, even if the administrator tries to disable it."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:snmp:snmp:*:*:*:*:*:*:*:*","matchCriteriaId":"9249561D-5224-41C5-A5B4-29F2F63ED163"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:network_appliance:netcache:*:*:*:*:*:*:*:*","matchCriteriaId":"EFDF1B67-E853-41EC-8BA8-5FD4D47F61CD"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0472","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0472","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-240","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.broadcom.com/support/fibre-channel-networking/security-advisories/brocade-security-advisory-2017-240/","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0473","sourceIdentifier":"cve@mitre.org","published":"1999-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rsync command before rsync 2.3.1 may inadvertently change the permissions of the client's working directory to the permissions of the directory being transferred."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:andrew_tridgell:rsync:*:*:*:*:*:*:*:*","versionEndIncluding":"2.3.1","matchCriteriaId":"E2804E6B-9C98-4B0D-BC5C-3B92BF347B53"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/145","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/145","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1196","sourceIdentifier":"cve@mitre.org","published":"1999-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hummingbird Exceed X version 5 allows remote attackers to cause a denial of service via malformed data to port 6000."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hummingbird:exceed:5.0:*:*:*:*:*:*:*","matchCriteriaId":"CFE7E6AB-7DA4-47EA-A197-D20E37ED19B7"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/13451","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/158","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/archive/1/13451","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/158","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}],"evaluatorSolution":"Upgrade to a non-vulnerable version of Exceed (Hummingbird Exceed 6.0.1 Hummingbird Exceed 6.0.2 Hummingbird Exceed 6.1)"}},{"cve":{"id":"CVE-1999-0287","sourceIdentifier":"cve@mitre.org","published":"1999-04-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the Wguest CGI program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webcom:cgi_guestbook:*:*:*:*:*:*:*:*","matchCriteriaId":"A1E39DAD-2870-4BB8-A146-061F95AC2D0B"}]}]}],"references":[{"url":"https://marc.info/?l=ntbugtraq&m=92368828704896&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=ntbugtraq&m=92368828704896&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0468","sourceIdentifier":"cve@mitre.org","published":"1999-04-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.0 allows a remote server to read arbitrary files on the client's file system using the Microsoft Scriptlet Component."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:N","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":4.2}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-012","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-012","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0470","sourceIdentifier":"cve@mitre.org","published":"1999-04-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A weak encryption algorithm is used for passwords in Novell Remote.NLM, allowing them to be easily decrypted."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.0:*:*:*:*:*:*:*","matchCriteriaId":"98DA9E1F-E489-4D63-9CCA-6C011E6B08C6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/482","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/482","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0471","sourceIdentifier":"cve@mitre.org","published":"1999-04-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The remote proxy server in Winroute allows a remote attacker to reconfigure the proxy without authentication through the \"cancel\" button."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:winroute:winroute:*:*:*:*:*:*:*:*","matchCriteriaId":"29A623FC-3A71-4B79-921F-2F19CBB31E37"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0471","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0471","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0801","sourceIdentifier":"cve@mitre.org","published":"1999-04-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BMC Patrol allows remote attackers to gain access to an agent by spoofing frames."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"6C07DD3D-C806-4218-BBC8-B859940D9330"}]}]}],"references":[{"url":"http://www.iss.net/security_center/static/2075.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/13204","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/2075.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/13204","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1323","sourceIdentifier":"cve@mitre.org","published":"1999-04-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Norton AntiVirus for Internet Email Gateways (NAVIEG) 1.0.1.7 and earlier, and Norton AntiVirus for MS Exchange (NAVMSE) 1.5 and earlier, store the administrator password in cleartext in (1) the navieg.ini file for NAVIEG, and (2) the ModifyPassword registry key in NAVMSE."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:norton_antivirus:*:*:internet_email_gateways:*:*:*:*:*","versionEndIncluding":"1.0.1.7","matchCriteriaId":"0653E1AA-4FE6-42A2-B221-52DF556544C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:norton_antivirus:*:*:exchange:*:*:*:*:*","versionEndIncluding":"1.5","matchCriteriaId":"478F8894-81D8-43F3-8C2D-098419BFD96D"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92370067416739&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92370067416739&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0444","sourceIdentifier":"cve@mitre.org","published":"1999-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can perform a denial of service in Windows machines using malicious ARP packets, forcing a message box display for each packet or filling up log files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=92394891221029&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=92394891221029&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0446","sourceIdentifier":"cve@mitre.org","published":"1999-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Local users can perform a denial of service in NetBSD 1.3.3 and earlier versions by creating an unusual symbolic link with the ln command, triggering a bug in VFS."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"}]}]}],"references":[{"url":"http://www.osvdb.org/7051","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7051","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1369","sourceIdentifier":"cve@mitre.org","published":"1999-04-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Real Media RealServer (rmserver) 6.0.3.353 stores a password in plaintext in the world-readable rmserver.cfg file, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:6.0.3.353:*:*:*:*:*:*:*","matchCriteriaId":"A0E48281-E72C-437C-8329-DC4E9F9AD04D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92411181619110&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92411181619110&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1244","sourceIdentifier":"cve@mitre.org","published":"1999-04-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IPFilter 3.2.3 through 3.2.10 allows local users to modify arbitrary files via a symlink attack on the saved output file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B0B3CD7E-742F-43DD-9179-348D345EBCA4"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"B304AA52-CA2E-4BB6-8083-DA23F5E3666B"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"8651AFB6-AE6B-476E-9040-686E8D3B3E2D"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.6:*:*:*:*:*:*:*","matchCriteriaId":"9D06BB0F-7C38-4D0F-8F1D-DDEA5BA72FA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.7:*:*:*:*:*:*:*","matchCriteriaId":"DE1C3525-3BA8-4198-9932-394E77290863"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.8:*:*:*:*:*:*:*","matchCriteriaId":"802826A3-6CF8-4821-A186-6BE979CE536D"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.9:*:*:*:*:*:*:*","matchCriteriaId":"ADEB76BF-F6DA-47DF-8212-85700E147D33"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.2.10:*:*:*:*:*:*:*","matchCriteriaId":"FA4E6702-F0F0-42CA-A135-839C09C061E6"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/13303","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2087","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/13303","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2087","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0684","sourceIdentifier":"cve@mitre.org","published":"1999-04-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Sendmail 8.8.6 in HPUX."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:sendmail:8.8.6:*:*:*:*:*:*:*","matchCriteriaId":"EF24069D-A149-4452-9D61-51FCE6C827C0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0684","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0684","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0491","sourceIdentifier":"cve@mitre.org","published":"1999-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The prompt parsing in bash allows a local user to execute commands as another user by creating a directory with the name of the command to execute."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:*:*:*:*:*:*:*:*","versionEndIncluding":"2.04","matchCriteriaId":"D642E874-A9B5-4199-8C9D-9CCA1B90C40D"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.0:*:*:*:*:*:*:*","matchCriteriaId":"FCAC75DF-FFF7-4721-9D47-6E29A5CCB7C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.1:*:*:*:*:*:*:*","matchCriteriaId":"FCF4B4BB-C5A0-4283-9657-FC61BC95C014"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.2:*:*:*:*:*:*:*","matchCriteriaId":"9B04CBBD-E855-48D7-A5C9-AEC2B38FF1F4"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.3:*:*:*:*:*:*:*","matchCriteriaId":"972BDA0A-25C8-4C02-8624-07D2462C214C"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.4:*:*:*:*:*:*:*","matchCriteriaId":"5B9EDE56-A8C4-40A8-9D14-F6E86F464BD7"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.5:*:*:*:*:*:*:*","matchCriteriaId":"DAB4B8E1-E013-4DB5-AF65-70CC2AEC3B20"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.6:*:*:*:*:*:*:*","matchCriteriaId":"B5428D5A-7443-4BDD-9690-E44DBDBCAC9E"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:1.14.7:*:*:*:*:*:*:*","matchCriteriaId":"18A6E8C3-334D-443B-8AD6-F8A131490F4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.0:*:*:*:*:*:*:*","matchCriteriaId":"5C74DAE6-8A77-47BF-B3ED-D76CD5AD75BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.01:*:*:*:*:*:*:*","matchCriteriaId":"8B631B7E-C59D-444F-80CE-DC2345A56E97"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.01.1:*:*:*:*:*:*:*","matchCriteriaId":"91C8E637-AD10-4854-AD60-A908D017DDA8"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.02:*:*:*:*:*:*:*","matchCriteriaId":"75AB7456-89E4-4F40-82D0-EED52CAEE670"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.02.1:*:*:*:*:*:*:*","matchCriteriaId":"C7E516F7-B6C6-4A0B-90F4-BC0F382E62E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.03:*:*:*:*:*:*:*","matchCriteriaId":"2E37A5D0-79EB-442D-B4B8-49F5137A3FA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.05:*:*:*:*:*:*:*","matchCriteriaId":"0F027515-A126-4899-B78E-121C8312002F"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:bash:2.05:a:*:*:*:*:*:*","matchCriteriaId":"AC05A483-FAFD-4C40-85BC-D2EE907B2B54"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-008.0.txt","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/119","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9904202114070.6623-100000%40smooth.Operator.org","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-008.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/119","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9904202114070.6623-100000%40smooth.Operator.org","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0604","sourceIdentifier":"cve@mitre.org","published":"1999-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An incorrect configuration of the WebStore 1.0 shopping cart CGI program \"web_store.cgi\" could disclose private information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:selena_sol:selena_sol_webstore:1.0:*:*:*:*:*:*:*","matchCriteriaId":"54C62EA6-5F28-45B2-9A83-2CF0677FE727"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0607","sourceIdentifier":"cve@mitre.org","published":"1999-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"quikstore.cgi in QuikStore shopping cart stores quikstore.cfg under the web document root with insufficient access control, which allows remote attackers to obtain the cleartext administrator password and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:i-soft:quikstore:*:*:*:*:*:*:*:*","matchCriteriaId":"97464CB1-6822-4CAF-A155-9CC35A19594E"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92462991805485&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0466","sourceIdentifier":"cve@mitre.org","published":"1999-04-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SVR4 /dev/wabi special device file in NetBSD 1.3.3 and earlier allows a local user to read or write arbitrary files on the disk associated with that device."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"}]}]}],"references":[{"url":"http://www.osvdb.org/905","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/905","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0488","sourceIdentifier":"cve@mitre.org","published":"1999-04-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.0 and 5.0 allows a remote attacker to execute security scripts in a different security context using malicious URLs, a variant of the \"cross frame\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp1:*:*:*:*:*:*","matchCriteriaId":"0AF9C64F-9A67-4BA9-A653-75507935E6EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-012","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-012","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0490","sourceIdentifier":"cve@mitre.org","published":"1999-04-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to learn information about a local user's files via an IMG SRC tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-012","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-012","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0492","sourceIdentifier":"cve@mitre.org","published":"1999-04-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ffingerd 1.19 allows remote attackers to identify users on the target system based on its responses."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0492","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0492","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0712","sourceIdentifier":"cve@mitre.org","published":"1999-04-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:caldera:coas:1.0.5:*:*:*:*:*:*:*","matchCriteriaId":"2768B34B-979E-480C-ABEB-6D599305BFFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:caldera:coas:1.0.6:*:*:*:*:*:*:*","matchCriteriaId":"F0A2FA5B-8B20-4324-9AA2-D6D689D9B08F"},{"vulnerable":true,"criteria":"cpe:2.3:a:caldera:coas:1.0.7:*:*:*:*:*:*:*","matchCriteriaId":"FB6C4E55-A3DA-48C2-A4F9-3D93759FAE54"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"86288A2E-B1BD-4DA9-BCCC-35AC44EEDD52"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0712","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0712","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0711","sourceIdentifier":"cve@mitre.org","published":"1999-04-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.3:*:*:*:*:*:*:*","matchCriteriaId":"44F4BD05-8A36-4C17-AA00-01CE12A66137"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.4:*:*:*:*:*:*:*","matchCriteriaId":"BF68DBCB-377C-476A-9373-5A85AA20916C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.5:*:*:*:*:*:*:*","matchCriteriaId":"0F492716-428E-41DF-AC50-1C8A84DBA2DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.5.1:*:*:*:*:*:*:*","matchCriteriaId":"AE91CC68-D396-4437-886C-370D30A771CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.1.5:*:*:*:*:*:*:*","matchCriteriaId":"42AF8B37-C5AA-4B92-A565-214A677C3486"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92609807906778&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?t=92550157100002&w=2&r=1","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92609807906778&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?t=92550157100002&w=2&r=1","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0194","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in in.comsat allows attackers to generate messages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0194","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0194","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0487","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The DHTML Edit ActiveX control in Internet Explorer allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-011","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-011","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0763","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetBSD on a multi-homed host allows ARP packets on one network to modify ARP entries on another connected network."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"}]}]}],"references":[{"url":"http://www.osvdb.org/6540","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6540","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0764","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetBSD allows ARP packets to overwrite static ARP entries."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"}]}]}],"references":[{"url":"http://www.osvdb.org/6539","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6539","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0807","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:directory_server:*:*:*:*:*:*:*:*","matchCriteriaId":"33D8DAD0-34B8-4D97-B026-4305D6C73B12"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1418","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ICQ99 ICQ web server build 1701 with \"Active Homepage\" enabled generates allows remote attackers to determine the existence of files on the server by comparing server responses when a file exists (\"404 Forbidden\") versus when a file does not exist (\"404 not found\")."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq_web_front:*:*:*:*:*:*:*:*","matchCriteriaId":"5BAA7C32-B6AE-4033-A91E-29962CCB0190"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/13508","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/246","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/13508","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/246","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1553","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in XCmail 0.99.6 with autoquote enabled allows remote attackers to execute arbitrary commands via a long subject line."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xcmail:xcmail:0.99.6:*:*:*:*:*:*:*","matchCriteriaId":"F648C777-04FD-4F93-BE0F-B1A214BA63DF"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/12730","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/311","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1859","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/12730","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/311","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1859","source":"af854a3a-2127-422b-91ae-364da2661108"}],"evaluatorSolution":"The authors were notified of this problem and it was fixed in devel-release 0.99.7."}},{"cve":{"id":"CVE-2000-0412","sourceIdentifier":"cve@mitre.org","published":"1999-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The gnapster and knapster clients for Napster do not properly restrict access only to MP3 files, which allows remote attackers to read arbitrary files from the client by specifying the full pathname for the file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:napster:knapster:napster:*:*:*:*:*:*:*","matchCriteriaId":"D374899D-763B-49F9-96D8-831D7573BD0E"}]}]}],"references":[{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:18-gnapster.adv","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0124.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0127.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1186","source":"cve@mitre.org"},{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:18-gnapster.adv","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0124.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0127.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1186","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1012","sourceIdentifier":"cve@mitre.org","published":"1999-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SMTP component of Lotus Domino 4.6.1 on AS/400, and possibly other operating systems, allows a remote attacker to crash the mail server via a long string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino:4.6.1:*:as_400:*:*:*:*:*","matchCriteriaId":"DCEF37BA-4294-4F11-BCA9-CBA04370921A"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/13527","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/173","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/13527","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/173","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1097","sourceIdentifier":"cve@mitre.org","published":"1999-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft NetMeeting 2.1 allows one client to read the contents of another client's clipboard via a CTRL-C in the chat box when the box is empty."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:netmeeting:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1","matchCriteriaId":"15B0FC30-A23E-435C-8B15-9C544CFB99F8"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92586457816446&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2187","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92586457816446&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2187","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1195","sourceIdentifier":"cve@mitre.org","published":"1999-05-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NAI VirusScan NT 4.0.2 does not properly modify the scan.dat virus definition file during an update via FTP, but it reports that the update was successful, which could cause a system administrator to believe that the definitions have been updated correctly."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:virusscan:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"DBB7848B-0E1D-4EEA-8C1B-38C8EB3B6C09"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92588169005196&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92587579032534&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/169","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92588169005196&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92587579032534&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/169","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1079","sourceIdentifier":"cve@mitre.org","published":"1999-05-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92601792420088&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93587956513233&w=2","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/servlet/support/manager?rs=0&rt=0&org=apars&doc=08E0B1A1B85472A1852567C90031BB36","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/439","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=92601792420088&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93587956513233&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www-1.ibm.com/servlet/support/manager?rs=0&rt=0&org=apars&doc=08E0B1A1B85472A1852567C90031BB36","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/439","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1241","sourceIdentifier":"cve@mitre.org","published":"1999-05-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer, with a security setting below Medium, allows remote attackers to execute arbitrary commands via a malicious web page that uses the FileSystemObject ActiveX object."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*","matchCriteriaId":"7B90EA4B-DA10-44B7-BD3D-6AE1197212D5"}]}]}],"references":[{"url":"http://oliver.efri.hr/~crv/security/bugs/NT/activex4.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2173","source":"cve@mitre.org"},{"url":"http://oliver.efri.hr/~crv/security/bugs/NT/activex4.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2173","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1367","sourceIdentifier":"cve@mitre.org","published":"1999-05-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.0 does not properly reset the username/password cache for Web sites that do not use standard cache controls, which could allow users on the same system to access restricted web sites that were visited by other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://www.pcworld.com/news/article/0%2Caid%2C10842%2C00.asp","source":"cve@mitre.org"},{"url":"http://www.pcworld.com/news/article/0%2Caid%2C10842%2C00.asp","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0686","sourceIdentifier":"cve@mitre.org","published":"1999-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:*:*:*:*:*:*:*:*","matchCriteriaId":"EF437206-7696-4583-A6DC-A622F02001EF"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-046.shtml","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-098","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-046.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-098","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0717","sourceIdentifier":"cve@mitre.org","published":"1999-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote attacker can disable the virus warning mechanism in Microsoft Excel 97."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:excel:*:*:*:*:*:*:*:*","matchCriteriaId":"7973AE7A-FE9F-4AB8-BBA8-98F3AF25487C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231304","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-014","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231304","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-014","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0736","sourceIdentifier":"cve@mitre.org","published":"1999-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The showcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A932","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A932","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0737","sourceIdentifier":"cve@mitre.org","published":"1999-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The viewcode.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0738","sourceIdentifier":"cve@mitre.org","published":"1999-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The code.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0739","sourceIdentifier":"cve@mitre.org","published":"1999-05-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The codebrws.asp sample file in IIS and Site Server allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1566","sourceIdentifier":"cve@mitre.org","published":"1999-05-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in iParty server 1.2 and earlier allows remote attackers to cause a denial of service (crash) by connecting to default port 6004 and sending repeated extended characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:iparty:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2","matchCriteriaId":"4B7BB77B-6442-4763-97D9-AAC73BD5C097"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/13600","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/13600","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0806","sourceIdentifier":"cve@mitre.org","published":"1999-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris dtprintinfo program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"http://www.osvdb.org/6552","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6552","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0754","sourceIdentifier":"cve@mitre.org","published":"1999-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The INN inndstart program allows local users to gain privileges by specifying an alternate configuration file using the INNCONF environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:*:*:*:*:*:*:*:*","matchCriteriaId":"2CFFB533-89C9-493A-851E-393D502C8A9E"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-011.0.txt","source":"cve@mitre.org"},{"url":"http://www.redhat.com/corp/support/errata/inn99_05_22.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/255","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-011.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/corp/support/errata/inn99_05_22.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/255","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0773","sourceIdentifier":"cve@mitre.org","published":"1999-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris lpset program allows local users to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.netspace.org/cgi-bin/wa?A2=ind9905B&L=bugtraq&P=R2017","source":"cve@mitre.org"},{"url":"http://www.netspace.org/cgi-bin/wa?A2=ind9905B&L=bugtraq&P=R2017","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0785","sourceIdentifier":"cve@mitre.org","published":"1999-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The INN inndstart program allows local users to gain root privileges via the \"pathrun\" parameter in the inn.conf file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.0:*:*:*:*:*:*:*","matchCriteriaId":"A2480B45-A626-49F5-A48B-BA6DFAA4411B"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.1:*:*:*:*:*:*:*","matchCriteriaId":"21969A37-9F10-4D70-AC73-F3DB4D169AEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.2:*:*:*:*:*:*:*","matchCriteriaId":"94FD2948-EF52-464B-A605-DA3806037762"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/254","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/254","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1033","sourceIdentifier":"cve@mitre.org","published":"1999-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Outlook Express before 4.72.3612.1700 allows a malicious user to send a message that contains a .., which can inadvertently cause Outlook to re-enter POP3 command mode and cause the POP3 session to hang."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:*:*:*:*:*:*:*:*","versionEndIncluding":"4.72.3612.1700","matchCriteriaId":"00B9B00C-F15C-4876-BE02-5FD6DBBBB488"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.27.3110.1:*:*:*:*:*:*:*","matchCriteriaId":"6BAE90D0-1637-49F4-8453-5E9959B55002"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.72.3120.0:*:*:*:*:*:*:*","matchCriteriaId":"7769EE2E-A740-4AE8-B1B1-A5256C12601D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92647407427342&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92663402004275&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/252","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=92647407427342&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92663402004275&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/252","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1520","sourceIdentifier":"cve@mitre.org","published":"1999-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A configuration problem in the Ad Server Sample directory (AdSamples) in Microsoft Site Server 3.0 allows an attacker to obtain the SITE.CSC file, which exposes sensitive SQL database information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92647407227303&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/256","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2270","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92647407227303&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/256","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2270","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0229","sourceIdentifier":"cve@mitre.org","published":"1999-05-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Windows NT IIS server using ..\\.."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*","matchCriteriaId":"CE9D333C-76E2-4BD9-B98B-5CB96363AB89"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0229","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0229","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0776","sourceIdentifier":"cve@mitre.org","published":"1999-05-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Alibaba HTTP server allows remote attackers to read files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:computer_software_manufaktur:alibaba:2.0:*:*:*:*:*:*:*","matchCriteriaId":"8DD3CBF4-B593-4C4A-8B9C-D005846B4090"}]}]}],"references":[{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9905&L=NTBUGTRAQ&P=R1533","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9905&L=NTBUGTRAQ&P=R1533","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1368","sourceIdentifier":"cve@mitre.org","published":"1999-05-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AV Option for MS Exchange Server option for InoculateIT 4.53, and possibly other versions, only scans the Inbox folder tree of a Microsoft Exchange server, which could allow viruses to escape detection if a user's rules cause the message to be moved to a different mailbox."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:broadcom:inoculateit:4.53:*:*:*:*:*:*:*","matchCriteriaId":"040E3DEF-F707-48EC-926F-B2CE00C8B90A"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92652152723629&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=97439568517355&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92652152723629&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=97439568517355&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1029","sourceIdentifier":"cve@mitre.org","published":"1999-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SSH server (sshd2) before 2.0.12 does not properly record login attempts if the connection is closed before the maximum number of tries, allowing a remote attacker to guess the password without showing up in the audit logs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"6FB31028-59BA-4833-BF14-3CB1CA18DAAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"8A3E89B6-872D-4541-A413-88A956FDAE81"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"98CC86ED-CA78-4E2A-8A12-4F766DB79733"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"BD500A33-4D0E-44B5-9BBE-A30AA999F662"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"EBB8D72F-51E7-47DF-96A4-4EBB517A79D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*","matchCriteriaId":"EC2379BA-621E-4986-AAC5-AF359FD57381"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*","matchCriteriaId":"9972B3A4-369E-40B5-9415-F92B7394604A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"1B6E719F-010B-4B8A-B508-0491BD15C465"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*","matchCriteriaId":"E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"B7735CDD-8BFC-4E30-9C88-27C8943637CA"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92663402004280&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/277","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2193","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92663402004280&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/277","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2193","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1366","sourceIdentifier":"cve@mitre.org","published":"1999-05-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pegasus e-mail client 3.0 and earlier uses weak encryption to store POP3 passwords in the pmail.ini file, which allows local users to easily decrypt the passwords and read e-mail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:david_harris:pegasus_mail:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0","matchCriteriaId":"BA789358-19BB-4F92-A11E-0622E48B355D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92714118829880&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92714118829880&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0489","sourceIdentifier":"cve@mitre.org","published":"1999-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MSHTML.DLL in Internet Explorer 5.0 allows a remote attacker to paste a file name into the file upload intrinsic control, a variant of \"untrusted scripted paste\" as described in MS:MS98-013."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-015","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-015","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0716","sourceIdentifier":"cve@mitre.org","published":"1999-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Windows NT 4.0 help file utility via a malformed help file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231605","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-015","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231605","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-015","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1156","sourceIdentifier":"cve@mitre.org","published":"1999-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BisonWare FTP Server 4.1 and earlier allows remote attackers to cause a denial of service via a malformed PORT command that contains a non-numeric character and a large number of carriage returns."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bisonware:bisonware_ftp_server:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1","matchCriteriaId":"D856B65A-48E8-4175-B10F-EFE6EE788AE4"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2254","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2254","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1510","sourceIdentifier":"cve@mitre.org","published":"1999-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Bisonware FTP server prior to 4.1 allow remote attackers to cause a denial of service, and possibly execute arbitrary commands, via long (1) USER, (2) LIST, or (3) CWD commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bisonware:bisonware_ftp_server:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1","matchCriteriaId":"D856B65A-48E8-4175-B10F-EFE6EE788AE4"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92697301706956&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3234","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92697301706956&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3234","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0765","sourceIdentifier":"cve@mitre.org","published":"1999-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI IRIX midikeys program allows local users to modify arbitrary files via a text editor."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19990501-01-A","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/262","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19990501-01-A","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/262","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1030","sourceIdentifier":"cve@mitre.org","published":"1999-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"counter.exe 2.70 allows a remote attacker to cause a denial of service (hang) via an HTTP request that ends in %0A (newline), which causes a malformed entry in the counter log that produces an access violation."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:behold_software:web_page_counter:2.7:*:*:*:*:*:*:*","matchCriteriaId":"88D22226-F7FB-49F0-A5F8-BB80D14A3073"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92713790426690&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92707671717292&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/267","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=92713790426690&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92707671717292&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/267","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1031","sourceIdentifier":"cve@mitre.org","published":"1999-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"counter.exe 2.70 allows a remote attacker to cause a denial of service (hang) via a long argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:behold_software:web_page_counter:2.7:*:*:*:*:*:*:*","matchCriteriaId":"88D22226-F7FB-49F0-A5F8-BB80D14A3073"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92713790426690&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92707671717292&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/267","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92713790426690&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92707671717292&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/267","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0715","sourceIdentifier":"cve@mitre.org","published":"1999-05-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ230677","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-016","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ230677","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-016","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1393","sourceIdentifier":"cve@mitre.org","published":"1999-05-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Control Panel \"Password Security\" option for Apple Powerbooks allows attackers with physical access to the machine to bypass the security by booting it with an emergency startup disk and using a disk editor to modify the on/off toggle or password in the aaaaaaaAPWD file, which is normally inaccessible."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:8.5:*:*:*:*:*:*:*","matchCriteriaId":"B228B2A1-8897-4028-9744-B30021CC6ECB"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:8.6:*:*:*:*:*:*:*","matchCriteriaId":"5CD596AD-EBF4-4A02-88E2-54952FD19E09"}]}]}],"references":[{"url":"http://freaky.staticusers.net/macsec/data/powerbooksecurity-data.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/532","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://freaky.staticusers.net/macsec/data/powerbooksecurity-data.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/532","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0928","sourceIdentifier":"cve@mitre.org","published":"1999-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SmartDesk WebSuite allows remote attackers to cause a denial of service via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:smartdesk:websuite:2.1:*:*:*:*:*:*:*","matchCriteriaId":"4AE1044E-7091-4624-9F4F-AE051BC0C577"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/278","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/278","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0762","sourceIdentifier":"cve@mitre.org","published":"1999-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When Javascript is embedded within the TITLE tag, Netscape Communicator allows a remote attacker to use the \"about\" protocol to gain access to browser information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.6:*:windows_95:*:*:*:*:*","matchCriteriaId":"2120677E-C560-408F-93C0-13A9CEEF0565"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.x:*:*:*:*:*:*:*","matchCriteriaId":"93E61D1F-588C-4B84-B5CA-8AB68AE4DF1B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:*:*:*:*:*:*:*:*","matchCriteriaId":"DA2CA2F8-260C-4559-BF24-3E321CEAE93F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0762","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0762","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0803","sourceIdentifier":"cve@mitre.org","published":"1999-05-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The fwluser script in AIX eNetwork Firewall allows local users to write to arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aix_enetwork_firewall:3.2:*:*:*:*:*:*:*","matchCriteriaId":"1D8CDA6A-21A4-4D8A-A0ED-78225D6371CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:aix_enetwork_firewall:3.3:*:*:*:*:*:*:*","matchCriteriaId":"D71B256F-C607-4A3A-8918-8049223878EF"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92765973207648&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/962","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92765973207648&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/962","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1414","sourceIdentifier":"cve@mitre.org","published":"1999-05-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Netfinity Remote Control allows local users to gain administrator privileges by starting programs from the process manager, which runs with system level privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:netfinity_remote_control:*:*:*:*:*:*:*:*","matchCriteriaId":"1A12AD28-B563-4F5F-8346-22BC4CE6D725"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92765856706547&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92902484317769&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/284","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92765856706547&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92902484317769&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/284","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0771","sourceIdentifier":"cve@mitre.org","published":"1999-05-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The web components of Compaq Management Agents and the Compaq Survey Utility allow a remote attacker to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:compaq:insight_management_agent:*:*:*:*:*:*:*:*","matchCriteriaId":"3EBD135D-F073-480E-A06E-D3C94B084F34"},{"vulnerable":true,"criteria":"cpe:2.3:a:compaq:power_management:2.0:*:*:*:*:*:*:*","matchCriteriaId":"84946D23-B332-4E59-A601-BEEF0DDB2CAB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0771","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0771","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0920","sourceIdentifier":"cve@mitre.org","published":"1999-05-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the pop-2d POP daemon in the IMAP package allows remote attackers to gain privileges via the FOLD command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:imap:4.4:*:*:*:*:*:*:*","matchCriteriaId":"131E16E8-69F2-4299-B8DB-F87F7AF3E969"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pop2d:*:*:*:*:*:*:*:*","matchCriteriaId":"9EE7A1E4-401F-4063-A3C5-94175ACD5E10"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/283","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/283","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0927","sourceIdentifier":"cve@mitre.org","published":"1999-05-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NTMail allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gordano:ntmail:4.20:*:*:*:*:*:*:*","matchCriteriaId":"3A3DCF83-E020-4879-9DDA-1FC1A68C639D"}]}]}],"references":[{"url":"http://www.eeye.com/html/Research/Advisories/AD05261999.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/279","source":"cve@mitre.org"},{"url":"http://www.eeye.com/html/Research/Advisories/AD05261999.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/279","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0755","sourceIdentifier":"cve@mitre.org","published":"1999-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT RRAS and RAS clients cache a user's password even if the user has not selected the \"Save password\" option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-255"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ230681","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-017","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ230681","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-017","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0802","sourceIdentifier":"cve@mitre.org","published":"1999-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Internet Explorer 5 allows remote attackers to execute commands via a malformed Favorites icon."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231450","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-018","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231450","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-018","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0917","sourceIdentifier":"cve@mitre.org","published":"1999-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Preloader ActiveX control used by Internet Explorer allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231452","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-018","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231452","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-018","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1028","sourceIdentifier":"cve@mitre.org","published":"1999-05-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Symantec pcAnywhere 8.0 allows remote attackers to cause a denial of service (CPU utilization) via a large amount of data to port 5631."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:8.0:*:*:*:*:*:*:*","matchCriteriaId":"447EE4D0-ED48-490E-BC1C-831A165CFF29"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92807524225090&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/2256.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/288","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=92807524225090&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/2256.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/288","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1485","sourceIdentifier":"cve@mitre.org","published":"1999-05-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"nsd in IRIX 6.5 through 6.5.2 exports a virtual filesystem on a UDP port, which allows remote attackers to view files and cause a possible denial of service by mounting the nsd virtual file system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"36B60E50-4F5A-4404-BEA3-C94F7D27B156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*","matchCriteriaId":"6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92818552106912&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8564","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/412","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2246","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2247","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92818552106912&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8564","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/412","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2246","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2247","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0333","sourceIdentifier":"cve@mitre.org","published":"1999-05-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"tcpdump, Ethereal, and other sniffer packages allow remote attackers to cause a denial of service via malformed DNS packets in which a jump offset refers to itself, which causes tcpdump to enter an infinite loop while decompressing the packet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.8.4:*:*:*:*:*:*:*","matchCriteriaId":"4814B853-3553-43CC-8415-5C3DCE1EB376"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.8.5:*:*:*:*:*:*:*","matchCriteriaId":"FE62DEB3-8DF4-424C-AE9C-0573432692B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:0.8.6:*:*:*:*:*:*:*","matchCriteriaId":"C1890B0A-82D7-4445-A90B-971A084425BA"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B9B50919-7C67-416D-BA2F-50747CDBE08F"},{"vulnerable":true,"criteria":"cpe:2.3:a:lbl:tcpdump:3.5a:*:*:*:*:*:*:*","matchCriteriaId":"D4C4E8A8-67BD-4DD9-AB04-53962AE17103"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1165","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.SOL.4.10.10005021942380.2077-100000%40paranoia.pgci.ca","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1165","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.SOL.4.10.10005021942380.2077-100000%40paranoia.pgci.ca","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0772","sourceIdentifier":"cve@mitre.org","published":"1999-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Compaq Management Agents and the Compaq Survey Utility via a long string sent to port 2301."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:compaq:insight_management_agent:*:*:*:*:*:*:*:*","matchCriteriaId":"3EBD135D-F073-480E-A06E-D3C94B084F34"},{"vulnerable":true,"criteria":"cpe:2.3:a:compaq:power_management:2.0:*:*:*:*:*:*:*","matchCriteriaId":"84946D23-B332-4E59-A601-BEEF0DDB2CAB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0772","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0772","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0804","sourceIdentifier":"cve@mitre.org","published":"1999-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"146F7A77-A950-4CAD-BDA9-C239696F569D"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/302","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/302","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1063","sourceIdentifier":"cve@mitre.org","published":"1999-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CDomain whois_raw.cgi whois CGI script allows remote attackers to execute arbitrary commands via shell metacharacters in the fqdn parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cdomain:cdomainfree:1.0:*:*:*:*:*:*:*","matchCriteriaId":"A5161B34-3898-4585-B9C9-B10F3B5A5F3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cdomain:cdomainfree:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F47E6F32-C2CC-494F-8576-09FE99A71FD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:cdomain:cdomainfree:2.1:*:*:*:*:*:*:*","matchCriteriaId":"49E3C4E5-3702-485F-802A-B72700F748F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:cdomain:cdomainfree:2.2:*:*:*:*:*:*:*","matchCriteriaId":"73A6DB69-8D0F-4C4D-82BA-1908FB071F05"},{"vulnerable":true,"criteria":"cpe:2.3:a:cdomain:cdomainfree:2.3:*:*:*:*:*:*:*","matchCriteriaId":"79A142F9-2A67-45F5-9CE0-9B561D3BC867"},{"vulnerable":true,"criteria":"cpe:2.3:a:cdomain:cdomainfree:2.4:*:*:*:*:*:*:*","matchCriteriaId":"D1B83A16-25FE-4F19-8E8F-870924F2522C"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/14019","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/304","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2251","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/14019","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/304","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2251","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0364","sourceIdentifier":"cve@mitre.org","published":"1999-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"screen and rxvt in Red Hat Linux 6.0 do not properly set the modes of tty devices, which allows local users to write to other ttys."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92877527701347&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92886009012161&w=2","source":"cve@mitre.org"},{"url":"http://www.redhat.com/corp/support/errata/RHSA1999014_01.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/309","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92877527701347&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92886009012161&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/corp/support/errata/RHSA1999014_01.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/309","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0365","sourceIdentifier":"cve@mitre.org","published":"1999-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Red Hat Linux 6.0 installs the /dev/pts file system with insecure modes, which allows local users to write to other tty devices."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92877527701347&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92886009012161&w=2","source":"cve@mitre.org"},{"url":"http://www.redhat.com/corp/support/errata/RHSA1999014_01.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/308","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=92877527701347&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=92886009012161&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/corp/support/errata/RHSA1999014_01.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/308","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0373","sourceIdentifier":"cve@mitre.org","published":"1999-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerabilities in the KDE kvt terminal program allow local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kde:kvt:*:*:*:*:*:*:*:*","matchCriteriaId":"5B226842-28F7-49F6-954B-135D9BA131F3"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-015.0.txt","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA1999015_01.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2266","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-015.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA1999015_01.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2266","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0481","sourceIdentifier":"cve@mitre.org","published":"1999-06-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in KDE Kmail allows a remote attacker to cause a denial of service via an attachment with a long file name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.23:*:*:*:*:*:*:*","matchCriteriaId":"F2732150-E1F0-4262-AD4E-DE2707DDCF4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.24:*:*:*:*:*:*:*","matchCriteriaId":"CBBEB8D7-42D5-4F89-AD58-6F3701095015"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.25:*:*:*:*:*:*:*","matchCriteriaId":"196AB8FD-6529-4240-83DB-E38D455D75CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.26:*:*:*:*:*:*:*","matchCriteriaId":"4BF9F1B4-D853-46F7-BD4D-18F267732DCC"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.27:*:*:*:*:*:*:*","matchCriteriaId":"E5A388BC-D200-4615-90C2-EA81244BD4D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.28:*:*:*:*:*:*:*","matchCriteriaId":"BD8ECC96-FAA9-4609-A7D0-9C73F2539CAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.29:*:*:*:*:*:*:*","matchCriteriaId":"0CB8D423-404A-4922-9D50-44AB6C191A42"},{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:1.0.29.1:*:*:*:*:*:*:*","matchCriteriaId":"481A4325-4E84-47D7-BE40-CC559EE58F02"}]}]}],"references":[{"url":"http://securityfocus.com/templates/archive.pike?list=82&date=2000-06-22&msg=00060200422401.01667%40lez","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1380","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4993","source":"cve@mitre.org"},{"url":"http://securityfocus.com/templates/archive.pike?list=82&date=2000-06-22&msg=00060200422401.01667%40lez","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1380","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4993","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1400","sourceIdentifier":"cve@mitre.org","published":"1999-06-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Economist screen saver 1999 with the \"Password Protected\" option enabled allows users with physical access to the machine to bypass the screen saver and read files by running Internet Explorer while the screen is still locked."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:the_economist:the_economist_1999_screen_saver:*:*:*:*:*:*:*:*","matchCriteriaId":"AAF2C673-257E-4BC1-B936-51F75C3F1BCC"}]}]}],"references":[{"url":"http://archives.indenial.com/hypermail/ntbugtraq/1999/June1999/0007.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.indenial.com/hypermail/ntbugtraq/1999/June1999/0009.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=92851653600852&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/466","source":"cve@mitre.org"},{"url":"http://archives.indenial.com/hypermail/ntbugtraq/1999/June1999/0007.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://archives.indenial.com/hypermail/ntbugtraq/1999/June1999/0009.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=92851653600852&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/466","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1412","sourceIdentifier":"cve@mitre.org","published":"1999-06-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A possible interaction between Apple MacOS X release 1.0 and Apache HTTP server allows remote attackers to cause a denial of service (crash) via a flood of HTTP GET requests to CGI programs, which generates a large number of processes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*","matchCriteriaId":"D623D8C0-65D2-4269-A1D4-5CB3899F44C8"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:1.0:*:*:*:*:*:*:*","matchCriteriaId":"51575CB1-A800-410A-BE8C-028FFD938245"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/14215","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/306","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/archive/1/14215","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/306","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0970","sourceIdentifier":"cve@mitre.org","published":"1999-06-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The OmniHTTPD visadmin.exe program allows a remote attacker to conduct a denial of service via a malformed URL which causes a large number of temporary files to be created."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:omnicron:omnihttpd:*:*:*:*:*:*:*:*","matchCriteriaId":"29AF27ED-3F69-4678-AF21-724923183401"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/14311","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1808","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2271","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/14311","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1808","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2271","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1237","sourceIdentifier":"cve@mitre.org","published":"1999-06-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple buffer overflows in smbvalid/smbval SMB authentication library, as used in Apache::AuthenSmb and possibly other modules, allows remote attackers to execute arbitrary commands via (1) a long username, (2) a long password, and (3) other unspecified methods."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*","matchCriteriaId":"D623D8C0-65D2-4269-A1D4-5CB3899F44C8"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/14384","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2272","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/archive/1/14384","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2272","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0493","sourceIdentifier":"cve@mitre.org","published":"1999-06-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"rpc.statd allows remote attackers to forward RPC calls to the local operating system via the SM_MON and SM_NOTIFY commands, which in turn could be used to remotely exploit other bugs such as in automountd."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91547759121289&w=2","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-99-05-statd-automountd.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/j-045.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/450","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91547759121289&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/186&type=0&nav=sec.sba","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-99-05-statd-automountd.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/j-045.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/450","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1496","sourceIdentifier":"cve@mitre.org","published":"1999-06-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sudo 1.5 in Debian Linux 2.1 and Red Hat 6.0 allows local users to determine the existence of arbitrary files by attempting to execute the target filename as a program, which generates a different error message when the file does not exist."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:todd_miller:sudo:1.5:*:*:*:*:*:*:*","matchCriteriaId":"9D796959-61D2-42D5-BF93-1A93AE1392BC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/14665","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/321","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2277","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/14665","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/321","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2277","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1231","sourceIdentifier":"cve@mitre.org","published":"1999-06-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ssh 2.0.12, and possibly other versions, allows valid user names to attempt to enter the correct password multiple times, but only prompts an invalid user name for a password once, which allows remote attackers to determine user account names on the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"6FB31028-59BA-4833-BF14-3CB1CA18DAAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"8A3E89B6-872D-4541-A413-88A956FDAE81"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"98CC86ED-CA78-4E2A-8A12-4F766DB79733"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"BD500A33-4D0E-44B5-9BBE-A30AA999F662"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"EBB8D72F-51E7-47DF-96A4-4EBB517A79D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*","matchCriteriaId":"EC2379BA-621E-4986-AAC5-AF359FD57381"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*","matchCriteriaId":"9972B3A4-369E-40B5-9415-F92B7394604A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"1B6E719F-010B-4B8A-B508-0491BD15C465"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*","matchCriteriaId":"E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"B7735CDD-8BFC-4E30-9C88-27C8943637CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*","matchCriteriaId":"A1582187-F4BA-44D6-97F0-E78D814A9E9E"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/14758","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2276","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/14758","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2276","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0118","sourceIdentifier":"cve@mitre.org","published":"1999-06-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Red Hat Linux su program does not log failed password guesses if the su process is killed before it times out, which allows local attackers to conduct brute force password guessing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"5302613E-F0DD-4B46-884C-49A977FD4147"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"674066BB-2576-4AAE-B97F-A4470815F1AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"445EECD3-2DB9-43D1-B26F-0979A3C02D45"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:alpha:*:*:*:*:*","matchCriteriaId":"07396B95-E434-46C9-A345-27C9EA9BEA26"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:sparc:*:*:*:*:*","matchCriteriaId":"0775CE08-C5AD-4FF7-AEA9-537B1EAE3BDE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*","matchCriteriaId":"6931FB54-A163-4CE3-BBD9-D345AA0977A6"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*","matchCriteriaId":"5ABD1331-277C-4C31-8186-978243C62255"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*","matchCriteriaId":"C89454B9-4F45-4A42-A06D-ED42D893C544"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*","matchCriteriaId":"1E64093E-7D53-4238-95C3-48ED5A0FFD97"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:*:*:x86:*:*:*:*:*","matchCriteriaId":"FEEC0C5A-4A6E-403C-B929-D1EC8B0FE2A8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:1.1.3:u1:*:*:*:*:*:*","matchCriteriaId":"D3373737-C6FC-4D19-845C-B0382AE1DC48"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:1.1.4:*:jl:*:*:*:*:*","matchCriteriaId":"10EC0267-500D-496F-9D88-7F93F7D4A88B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94935300520617&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94935300520617&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0775","sourceIdentifier":"cve@mitre.org","published":"1999-06-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Gigabit Switch routers running IOS allow remote attackers to forward unauthorized packets due to improper handling of the \"established\" keyword in an access list."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(14\\)gs2:*:*:*:*:*:*:*","matchCriteriaId":"0023E04A-6244-4221-AE19-616265074BDD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(15\\)g:*:*:*:*:*:*:*","matchCriteriaId":"52C4A8A9-A17E-48A1-99EC-A9F87CE17318"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0775","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0775","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1023","sourceIdentifier":"cve@mitre.org","published":"1999-06-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"useradd in Solaris 7.0 does not properly interpret certain date formats as specified in the \"-e\" (expiration date) argument, which could allow users to login after their accounts have expired."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=92904175406756&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/426","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=92904175406756&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/426","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0713","sourceIdentifier":"cve@mitre.org","published":"1999-06-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:*:*:*:*:*:*:*:*","matchCriteriaId":"B327A913-CD9E-48F8-B6AE-625AD7D8793A"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:-:*:*:*:*:*:*:*","matchCriteriaId":"589D7E39-A243-49F9-8F67-4B9E92AE87DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:transarc:afs:*:*:*:*:*:*:*:*","matchCriteriaId":"DBE38322-4EA7-4E45-A704-5F552E2D5DAA"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:*:*:*:*:*:*:*:*","matchCriteriaId":"2FE14F36-1B9B-447F-BA87-D7780F33C975"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-044.shtml","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-044.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0730","sourceIdentifier":"cve@mitre.org","published":"1999-06-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The zsoelim program in the Debian man-db package allows local users to overwrite files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F92AB32-E7DE-43F4-B877-1F41FA162EC7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0730","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0730","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0874","sourceIdentifier":"cve@mitre.org","published":"1999-06-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in IIS 4.0 allows remote attackers to cause a denial of service via a malformed request for files with .HTR, .IDC, or .STM extensions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ234905","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-048.shtml","source":"cve@mitre.org"},{"url":"http://www.eeye.com/html/Research/Advisories/AD06081999.html","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-019","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A915","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ234905","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-048.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.eeye.com/html/Research/Advisories/AD06081999.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-019","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A915","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0929","sourceIdentifier":"cve@mitre.org","published":"1999-06-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Novell NetWare with Novell-HTTP-Server or YAWN web servers allows remote attackers to conduct a denial of service via a large number of HTTP GET requests."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:http_server:2.51r1:*:*:*:*:*:*:*","matchCriteriaId":"7E8A518B-7753-4E25-9336-460A70E52541"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:http_server:3.1r1:*:*:*:*:*:*:*","matchCriteriaId":"041D1F45-8E68-4C00-955E-4A374B4B4A37"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.1:*:*:*:*:*:*:*","matchCriteriaId":"01439E99-85F3-47B6-802A-909B737071D2"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.11:*:*:*:*:*:*:*","matchCriteriaId":"771CB488-4109-453E-9C76-590A7805A6A0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0929","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0742","sourceIdentifier":"cve@mitre.org","published":"1999-06-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Debian mailman package uses weak authentication, which allows attackers to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/480","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/480","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0723","sourceIdentifier":"cve@mitre.org","published":"1999-06-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows NT Client Server Runtime Subsystem (CSRSS) can be subjected to a denial of service when all worker threads are waiting for user input."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ233323","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-049.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/478","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-021","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ233323","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-049.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/478","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-021","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0731","sourceIdentifier":"cve@mitre.org","published":"1999-06-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The KDE klock program allows local users to unlock a session using malformed input."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.3:*:*:*:*:*:*:*","matchCriteriaId":"EED21F27-4ADA-42AC-B28E-F849F47D4043"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"86288A2E-B1BD-4DA9-BCCC-35AC44EEDD52"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/489","source":"cve@mitre.org"},{"url":"https://github.com/KDE/kde1-kdebase/commit/04906bd5de2f220bf100b605dad37b4a1d9a91a6","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/489","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://github.com/KDE/kde1-kdebase/commit/04906bd5de2f220bf100b605dad37b4a1d9a91a6","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1019","sourceIdentifier":"cve@mitre.org","published":"1999-06-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SpectroSERVER in Cabletron Spectrum Enterprise Manager 5.0 installs a directory tree with insecure permissions, which allows local users to replace a privileged executable (processd) with a Trojan horse, facilitating a root or Administrator compromise."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cabletron:spectrum_enterprise_manager:5.0:*:*:*:*:*:*:*","matchCriteriaId":"7F2FA5E1-2E37-457D-9E29-D1E77AEACA43"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93024398513475&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93024398713491&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/495","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93024398513475&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93024398713491&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/495","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0748","sourceIdentifier":"cve@mitre.org","published":"1999-06-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Red Hat net-tools package."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA1999017_01.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA1999017_01.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1470","sourceIdentifier":"cve@mitre.org","published":"1999-06-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Eastman Work Management 3.21 stores passwords in cleartext in the COMMON and LOCATOR registry keys, which could allow local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eastman_software:work_management:3.2.1:*:*:*:*:*:*:*","matchCriteriaId":"5BAD853C-7BBA-4B70-B0E4-54B61344C180"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93034788412494&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/485","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2303","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93034788412494&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/485","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2303","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0778","sourceIdentifier":"cve@mitre.org","published":"1999-06-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Xi Graphics Accelerated-X server allows local users to gain root access via a long display or query parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xi_graphics:accelerated-x_server:4:*:*:*:*:*:*:*","matchCriteriaId":"F16E6A33-2908-4123-8F8D-F541610B2391"},{"vulnerable":true,"criteria":"cpe:2.3:a:xi_graphics:accelerated-x_server:5:*:*:*:*:*:*:*","matchCriteriaId":"31EF6F5D-1254-48E2-A6FA-ABA64C2AAC92"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/488","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/488","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1164","sourceIdentifier":"cve@mitre.org","published":"1999-06-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Outlook client allows remote attackers to cause a denial of service by sending multiple email messages with the same X-UIDL headers, which causes Outlook to hang."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:97:*:*:*:*:*:*:*","matchCriteriaId":"D1D5CC3A-E880-4727-AEBE-1E4FE5A43AF8"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*","matchCriteriaId":"52970A43-173E-477B-80BF-6FDBB6B0EECD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*","matchCriteriaId":"D52F17AB-2C87-4C1A-91B5-267ABBCF5844"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:*:*:*:*:*:*:*:*","matchCriteriaId":"1FD2BCA5-9DA0-472C-B0DF-A4A8BC54B4DE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93041631215856&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93041631215856&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0733","sourceIdentifier":"cve@mitre.org","published":"1999-06-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in VMWare 1.0.1 for Linux via a long HOME environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"AFBF029A-103D-4BB6-B037-25EC2224DF34"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/490","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/490","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0938","sourceIdentifier":"cve@mitre.org","published":"1999-06-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MBone SDR Package allows remote attackers to execute commands via shell metacharacters in Session Initiation Protocol (SIP) messages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_college_london:sdr:*:*:*:*:*:*:*:*","versionEndIncluding":"2.6.2","matchCriteriaId":"8A051C27-0A80-427D-870C-B1D2AF0470EC"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0938","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0938","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1365","sourceIdentifier":"cve@mitre.org","published":"1999-06-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93069418400856&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93127894731200&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/515","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2336","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93069418400856&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93127894731200&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/515","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2336","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0353","sourceIdentifier":"cve@mitre.org","published":"1999-06-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pine 4.x allows a remote attacker to execute arbitrary commands via an index.html file which executes lynx and obtains a uudecoded file from a malicious web server, which is then executed by Pine."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:3.98:*:*:*:*:*:*:*","matchCriteriaId":"49E9FC97-FE8B-46E9-BFB5-AC24524CCB97"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:4.0:*:*:*:*:*:*:*","matchCriteriaId":"9EAAAD98-14F0-4015-ACD4-B4D21EC86DC2"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:4.2:*:*:*:*:*:*:*","matchCriteriaId":"17158210-1EEF-4910-B9CB-3E81328B8374"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:4.10:*:*:*:*:*:*:*","matchCriteriaId":"358A71B0-79F2-4728-AC1E-5872BC64B2C3"}]}]}],"references":[{"url":"http://www.novell.com/linux/security/advisories/pine_update_announcement.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_6.html","source":"cve@mitre.org"},{"url":"http://www.securiteam.com/unixfocus/HHP-Pine_remote_exploit.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1247","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/pine_update_announcement.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_6.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securiteam.com/unixfocus/HHP-Pine_remote_exploit.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1247","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0916","sourceIdentifier":"cve@mitre.org","published":"1999-06-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WebTrends software stores account names and passwords in a file which does not have restricted access permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webtrends:webtrends_enterprise_suite:v3.5:*:*:*:*:*:*:*","matchCriteriaId":"348E16C7-B584-40CF-A55D-AB6B0EB3BFA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:webtrends:webtrends_for_firewalls:v1.2:*:*:*:*:*:*:*","matchCriteriaId":"7D58A5DF-2F5E-47F9-8395-BED1D23EBB89"},{"vulnerable":true,"criteria":"cpe:2.3:a:webtrends:webtrends_log_analyzer:v4.51:*:*:*:*:*:*:*","matchCriteriaId":"39A0B2A1-B52F-477E-918B-FF2E41583F60"},{"vulnerable":true,"criteria":"cpe:2.3:a:webtrends:webtrends_professional_suite:v3.01:*:*:*:*:*:*:*","matchCriteriaId":"3C5BECF2-9C47-4C1F-BA1E-317FB5FC569A"},{"vulnerable":true,"criteria":"cpe:2.3:a:webtrends:webtrends_security_analyzer:v2.0:*:*:*:*:*:*:*","matchCriteriaId":"426FF7E2-C6AD-4638-BC6B-928D73F217F7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0916","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0916","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0140","sourceIdentifier":"cve@mitre.org","published":"1999-06-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in RAS/PPTP on NT systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0140","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0140","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0726","sourceIdentifier":"cve@mitre.org","published":"1999-06-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An attacker can conduct a denial of service in Windows NT by executing a program with a malformed file image header."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ234557","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/499","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-023","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ234557","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/499","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-023","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1348","sourceIdentifier":"cve@mitre.org","published":"1999-06-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linuxconf on Red Hat Linux 6.0 and earlier does not properly disable PAM-based access to the shutdown command, which could allow local users to cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0","matchCriteriaId":"CA8CD46B-C22E-4576-9EA9-909B64D9EAC5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93220073515880&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93220073515880&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0688","sourceIdentifier":"cve@mitre.org","published":"1999-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/545","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-101","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/545","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-101","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0690","sourceIdentifier":"cve@mitre.org","published":"1999-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP CDE program includes the current directory in root's PATH variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:*:*:*:*:*:*:*:*","matchCriteriaId":"B327A913-CD9E-48F8-B6AE-625AD7D8793A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-053.shtml","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-100","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-053.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-100","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0696","sourceIdentifier":"cve@mitre.org","published":"1999-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*","matchCriteriaId":"4259A901-A1CF-44EE-80C4-2031D3FCADC3"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-051.shtml","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-051.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0707","sourceIdentifier":"cve@mitre.org","published":"1999-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:visualize_conference_ftp:*:*:*:*:*:*:*:*","matchCriteriaId":"23B9851E-8E7C-4966-A756-36DE3BD3D3CD"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-050.shtml","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/493","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-099","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-050.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/493","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-099","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0889","sourceIdentifier":"cve@mitre.org","published":"1999-07-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco 675 routers running CBOS allow remote attackers to establish telnet sessions if an exec or superuser password has not been set."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:675_router:*:*:*:*:*:*:*:*","matchCriteriaId":"79C42E18-4D5A-432C-B5C5-D57F7D40D414"}]}]}],"references":[{"url":"http://www.osvdb.org/39","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/39","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1394","sourceIdentifier":"cve@mitre.org","published":"1999-07-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BSD 4.4 based operating systems, when running at security level 1, allow the root user to clear the immutable and append-only flags for files by unmounting the file system and using a file system editor such as fsdb to directly modify the file through a device."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:4.4:*:*:*:*:*:*:*","matchCriteriaId":"3C37EB61-50BE-451A-916B-B05BAC79962B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93094058620450&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/510","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93094058620450&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/510","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0918","sourceIdentifier":"cve@mitre.org","published":"1999-07-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in various Windows systems via malformed, fragmented IGMP packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238329","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/514","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-034","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238329","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/514","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-034","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0728","sourceIdentifier":"cve@mitre.org","published":"1999-07-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT user can disable the keyboard or mouse by directly calling the IOCTLs which control them."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*","matchCriteriaId":"7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise:*:*:*:*:*","matchCriteriaId":"BBD9C514-5AF7-4849-A535-F0F3C9339051"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ236359","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-024","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ236359","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-024","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0752","sourceIdentifier":"cve@mitre.org","published":"1999-07-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Netscape Enterprise Server via a buffer overflow in the SSL handshake."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:*:*:*:*:*:*:*:*","matchCriteriaId":"EF437206-7696-4583-A6DC-A622F02001EF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0752","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0752","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1478","sourceIdentifier":"cve@mitre.org","published":"1999-07-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Sun HotSpot Performance Engine VM allows a remote attacker to cause a denial of service on any server running HotSpot via a URL that includes the [ character."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93138827429589&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93240220324183&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/522","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2348","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93138827429589&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93240220324183&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/522","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2348","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1537","sourceIdentifier":"cve@mitre.org","published":"1999-07-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 3.x and 4.x does not distinguish between pages requiring encryption and those that do not, which allows remote attackers to cause a denial of service (resource exhaustion) via SSL requests to the HTTPS port for normally unencrypted files, which will cause IIS to perform extra work to send the files over SSL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93138827329577&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/521","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2352","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93138827329577&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/521","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2352","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0809","sourceIdentifier":"cve@mitre.org","published":"1999-07-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Communicator 4.x with Javascript enabled does not warn a user of cookie settings, even if they have selected the option to \"Only accept cookies originating from the same server as the page being viewed\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0809","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0809","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1543","sourceIdentifier":"cve@mitre.org","published":"1999-07-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MacOS uses weak encryption for passwords that are stored in the Users & Groups Data File."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:7.5.3:*:*:*:*:*:*:*","matchCriteriaId":"B88C10C5-65BC-4628-A430-CB1B8234CDAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:7.6:*:*:*:*:*:*:*","matchCriteriaId":"B15533E4-98EF-42BD-AA46-C11A287C8461"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:7.6.1:*:*:*:*:*:*:*","matchCriteriaId":"46A397DB-8821-4195-AB2A-9F8BE40A183D"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:8.0:*:*:*:*:*:*:*","matchCriteriaId":"4F1F1D05-4A72-47DA-BEFA-C5643DC03890"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:8.1:*:*:*:*:*:*:*","matchCriteriaId":"CE76DE58-C0BD-4048-AE9F-5297A17099ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:8.5:*:*:*:*:*:*:*","matchCriteriaId":"B228B2A1-8897-4028-9744-B30021CC6ECB"},{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:8.6:*:*:*:*:*:*:*","matchCriteriaId":"5CD596AD-EBF4-4A02-88E2-54952FD19E09"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93188174906513&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93736667813924&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/519","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93188174906513&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93736667813924&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/519","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1166","sourceIdentifier":"cve@mitre.org","published":"1999-07-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux 2.0.37 does not properly encode the Custom segment limit, which allows local users to gain root privileges by accessing and modifying kernel memory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*","matchCriteriaId":"1E55F8A8-1ABD-4760-9074-353BBAEE005B"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/18156","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/523","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/18156","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/523","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1460","sourceIdentifier":"cve@mitre.org","published":"1999-07-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as root by specifying the target file as the second argument to the snmpmagt program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:*:*:*:*:*:*:*:*","versionEndIncluding":"3.2.7","matchCriteriaId":"5C00C28F-86B7-4DD0-94D0-835344ACAB3B"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD670201-A070-4E0D-BE58-2329116681AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"6C07DD3D-C806-4218-BBC8-B859940D9330"},{"vulnerable":true,"criteria":"cpe:2.3:a:bmc:patrol_agent:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"7B1CDFC2-10EC-4955-B254-5A22F910EFE8"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93198293132463&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93372579004129&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/525","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93198293132463&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93372579004129&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/525","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1545","sourceIdentifier":"cve@mitre.org","published":"1999-07-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Joe's Own Editor (joe) 2.8 sets the world-readable permission on its crash-save file, DEADJOE, which could allow local users to read files that were being edited by other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:joes_own_editor:joe:2.8:*:*:*:*:*:*:*","matchCriteriaId":"856FF937-2F8D-4B09-9B51-8F17FEB03DBF"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93216103027827&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93226771401036&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93216103027827&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93226771401036&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1086","sourceIdentifier":"cve@mitre.org","published":"1999-07-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Novell 5 and earlier, when running over IPX with a packet signature level less than 3, allows remote attackers to gain administrator privileges by spoofing the MAC address in IPC fragmented packets that make NetWare Core Protocol (NCP) calls."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0","matchCriteriaId":"55D70745-2A40-4A7A-A33F-B68443ACC303"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.1:*:*:*:*:*:*:*","matchCriteriaId":"01439E99-85F3-47B6-802A-909B737071D2"},{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:4.11:sp5b:*:*:*:*:*:*","matchCriteriaId":"063118A6-F4AA-4D3C-865C-DCD0F3623EF2"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93214475111651&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/528","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93214475111651&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/528","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1518","sourceIdentifier":"cve@mitre.org","published":"1999-07-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Operating systems with shared memory implementations based on BSD 4.4 code allow a user to conduct a denial of service and bypass memory limits (e.g., as specified with rlimits) using mmap or shmget to allocate memory and cause page faults."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","matchCriteriaId":"BF8F9B2F-E898-4F87-A245-32A41748587B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","matchCriteriaId":"314BA420-4C74-4060-8ACE-D7A7C041CF2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*","matchCriteriaId":"2EAD7613-A5B3-4621-B981-290C7C6B8BA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","matchCriteriaId":"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*","matchCriteriaId":"4319B741-4376-4EA2-9FEB-236C148D1514"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93207728118694&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/526","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2351","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93207728118694&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/526","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2351","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0692","sourceIdentifier":"cve@mitre.org","published":"1999-07-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"36B60E50-4F5A-4404-BEA3-C94F7D27B156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*","matchCriteriaId":"6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*","matchCriteriaId":"440B7208-34DB-4898-8461-4E703F7EDFB7"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:*:*:*:*:*:*:*:*","matchCriteriaId":"B7B7EE1D-BD38-49D6-B58E-34A53EB150C1"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/19990701-01-P","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-052.shtml","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/19990701-01-P","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-052.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1011","sourceIdentifier":"cve@mitre.org","published":"1999-07-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Remote Data Service (RDS) DataFactory component of Microsoft Data Access Components (MDAC) in IIS 3.x and 4.x exposes unsafe methods, which allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:data_access_components:1.5:*:*:*:*:*:*:*","matchCriteriaId":"1B1985AB-FCAB-4ABC-BF03-9E11CD015596"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:data_access_components:2.0:*:*:*:*:*:*:*","matchCriteriaId":"0D331DB4-AA55-4E1B-8B73-14EE2F13E09E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:data_access_components:2.1:*:*:*:*:*:*:*","matchCriteriaId":"A3BFD086-7F94-4482-AC27-E4FAD418B767"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D56759FD-DE03-4E90-8688-B6A49AA24F25"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-054.shtml","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/272","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-004","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-025","source":"cve@mitre.org"},{"url":"https://www.securityfocus.com/bid/529","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-054.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/272","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-004","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-025","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.securityfocus.com/bid/529","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1378","sourceIdentifier":"cve@mitre.org","published":"1999-07-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dbmlparser.exe CGI guestbook program does not perform a chroot operation properly, which allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dbmlparser.exe:dbmlparser.exe:*:*:*:*:*:*:*:*","matchCriteriaId":"55325DB2-3870-4835-B2D9-C3B3B26344FD"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93250710625956&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93250710625956&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0721","sourceIdentifier":"cve@mitre.org","published":"1999-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Windows NT Local Security Authority (LSA) through a malformed LSA request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231457","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-049.shtml","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-020","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ231457","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-049.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-020","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1535","sourceIdentifier":"cve@mitre.org","published":"1999-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AspUpload.dll in Persits Software AspUpload before 1.4.0.2 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument in the HTTP request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:persits:aspupload:*:*:*:*:*:*:*:*","versionEndIncluding":"1.4.0.2","matchCriteriaId":"CA4E5553-6629-4AC9-B20E-AA640EDD3512"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93256878011447&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93501427820328&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/592","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3291","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93256878011447&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93501427820328&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/592","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3291","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1560","sourceIdentifier":"cve@mitre.org","published":"1999-07-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in a script in Texas A&M University (TAMU) Tiger allows local users to execute arbitrary commands as the Tiger user, usually root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tamu:tiger:*:*:*:*:*:*:*:*","matchCriteriaId":"E7122C69-8C6A-452F-BAAF-B6DE2695F14C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93252050203589&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2369","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93252050203589&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2369","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0810","sourceIdentifier":"cve@mitre.org","published":"1999-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Samba NETBIOS name service daemon (nmbd)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:samba:samba:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"93AF43FA-9947-4F26-96E8-1D77BF909AA0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0810","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0810","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0811","sourceIdentifier":"cve@mitre.org","published":"1999-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Samba smbd program via a malformed message command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:samba:samba:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"D8F15704-2F2B-4536-A2A0-510B5CE91D09"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/536","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/536","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1165","sourceIdentifier":"cve@mitre.org","published":"1999-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"GNU fingerd 1.37 does not properly drop privileges before accessing user information, which could allow local users to (1) gain root privileges via a malicious program in the .fingerrc file, or (2) read arbitrary files via symbolic links from .plan, .forward, or .project files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:fingerd:1.37:*:*:*:*:*:*:*","matchCriteriaId":"7DD364F0-40E7-47D9-ADDF-8BA089FE8796"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93268249021561&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/2478","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/535","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93268249021561&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/2478","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/535","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1338","sourceIdentifier":"cve@mitre.org","published":"1999-07-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Delegate proxy 5.9.3 and earlier creates files and directories in the DGROOT with world-writable permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:delegate:delegate:*:*:*:*:*:*:*:*","versionEndIncluding":"5.9.3","matchCriteriaId":"B52E9623-AFCD-4AA6-A47B-DC3596897042"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93259112204664&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93259112204664&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0224","sourceIdentifier":"cve@mitre.org","published":"1999-07-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Windows NT messenger service through a long username."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0224","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0224","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0710","sourceIdentifier":"cve@mitre.org","published":"1999-07-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"A8EED385-8C39-4A40-A507-2EFE7652FB35"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://fedoranews.org/updates/FEDORA--.shtml","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2004/dsa-576","source":"cve@mitre.org"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-1999-025.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-489.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/2059","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2385","source":"cve@mitre.org"},{"url":"http://fedoranews.org/updates/FEDORA--.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2004/dsa-576","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-1999-025.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2005-489.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/2059","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2385","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1018","sourceIdentifier":"cve@mitre.org","published":"1999-07-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IPChains in Linux kernels 2.2.10 and earlier does not reassemble IP fragments before checking the header information, which allows a remote attacker to bypass the filtering rules using several fragments with 0 offsets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.10","matchCriteriaId":"45204613-D254-43D9-9261-EFC4DDD8576E"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"146F7A77-A950-4CAD-BDA9-C239696F569D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93312523904591&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/543","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93312523904591&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/543","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1017","sourceIdentifier":"cve@mitre.org","published":"1999-07-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Seattle Labs Emurl 2.0, and possibly earlier versions, stores e-mail attachments in a specific directory with scripting enabled, which allows a malicious ASP file attachment to execute when the recipient opens the message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seattle_lab_software:emurl:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0","matchCriteriaId":"EFB97341-3A0E-4B6C-AA51-9E3922B42598"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93316253431588&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/544","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=93316253431588&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/544","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0323","sourceIdentifier":"cve@mitre.org","published":"1999-07-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Microsoft Jet database engine allows an attacker to modify text files via a database query, aka the \"Text I-ISAM\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:jet:3.5:*:*:*:*:*:*:*","matchCriteriaId":"DFDB61BB-F95E-4312-9A26-5F883C951141"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:jet:3.51:*:*:*:*:*:*:*","matchCriteriaId":"2FF37F40-A14C-4653-8E7F-360F9ABB45AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:jet:4.0:*:*:*:*:*:*:*","matchCriteriaId":"7D19C4A6-8BDB-4397-9C51-8C9AC2B5D4FE"}]}]}],"references":[{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-08-22&msg=19990729195531.25108.qmail%40underground.org","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-030","source":"cve@mitre.org"},{"url":"https://web.archive.org/web/20000819203059/http://xforce.iss.net:80/alerts/vol-4_num-7.php#jet-text-isam","source":"cve@mitre.org"},{"url":"https://www.securityfocus.com/bid/595","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-08-22&msg=19990729195531.25108.qmail%40underground.org","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-030","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://web.archive.org/web/20000819203059/http://xforce.iss.net:80/alerts/vol-4_num-7.php#jet-text-isam","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://www.securityfocus.com/bid/595","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0700","sourceIdentifier":"cve@mitre.org","published":"1999-07-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237185","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-026","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237185","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-026","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0770","sourceIdentifier":"cve@mitre.org","published":"1999-07-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Firewall-1 sets a long timeout for connections that begin with ACK or other packets except SYN, allowing an attacker to conduct a denial of service via a large number of connection attempts to unresponsive systems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*","matchCriteriaId":"A550C18E-F07A-4A05-87F0-B1D52FDC401C"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F543272-8C7E-4326-BA97-142FBEA641E5"}]}]}],"references":[{"url":"http://www.osvdb.org/1027","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/549","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1027","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/549","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1078","sourceIdentifier":"cve@mitre.org","published":"1999-07-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WS_FTP Pro 6.0 uses weak encryption for passwords in its initialization files, which allows remote attackers to easily decrypt the passwords and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:ws_ftp_pro:6.0:*:*:*:*:*:*:*","matchCriteriaId":"69C53D89-E5B6-4734-8CDC-D81C1975640B"}]}]}],"references":[{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9907&L=ntbugtraq&D=0&P=10370&F=P","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/547","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9907&L=ntbugtraq&D=0&P=10370&F=P","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/547","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0683","sourceIdentifier":"cve@mitre.org","published":"1999-07-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Gauntlet Firewall via a malformed ICMP packet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:gauntlet_firewall:5.0:*:*:*:*:*:*:*","matchCriteriaId":"7A91D5DB-D09F-4CF6-99B2-B444FAD91A4B"}]}]}],"references":[{"url":"http://www.osvdb.org/1029","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/556","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1029","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/556","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1130","sourceIdentifier":"cve@mitre.org","published":"1999-07-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Default configuration of the search engine in Netscape Enterprise Server 3.5.1, and possibly other versions, allows remote attackers to read the source of JHTML files by specifying a search command using the HTML-tocrec-demo1.pat pattern file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:*:*:*:*:*:*:*:*","versionEndIncluding":"3.5.1","matchCriteriaId":"AAF865EE-D927-41E3-AB70-2E90D2C84685"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93346448121208&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93337389603117&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/559","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93346448121208&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93337389603117&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/559","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1227","sourceIdentifier":"cve@mitre.org","published":"1999-07-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ethereal allows local users to overwrite arbitrary files via a symlink attack on the packet capture file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ethereal_group:ethereal:*:*:*:*:*:*:*:*","matchCriteriaId":"4D7AF472-DA34-4E6F-801E-C06C135779B6"}]}]}],"references":[{"url":"http://www.ethereal.com/lists/ethereal-dev/199907/msg00126.html","source":"cve@mitre.org","tags":["Vendor Advisory","URL Repurposed"]},{"url":"http://www.ethereal.com/lists/ethereal-dev/199907/msg00130.html","source":"cve@mitre.org","tags":["Vendor Advisory","URL Repurposed"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3334","source":"cve@mitre.org"},{"url":"http://www.ethereal.com/lists/ethereal-dev/199907/msg00126.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory","URL Repurposed"]},{"url":"http://www.ethereal.com/lists/ethereal-dev/199907/msg00130.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory","URL Repurposed"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3334","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1536","sourceIdentifier":"cve@mitre.org","published":"1999-07-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":".sbstart startup script in AcuShop Salesbuilder is world writable, which allows local users to gain privileges by appending commands to the file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:acushop:salesbuilder:2.6:*:*:*:*:*:*:*","matchCriteriaId":"6435C1BD-6301-4A3B-8E32-C2CCC82194CB"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93347785827287&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/13557","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/560","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93347785827287&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/13557","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/560","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0672","sourceIdentifier":"cve@mitre.org","published":"1999-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fujitsu:chocoa:1.0beta7r:*:*:*:*:*:*:*","matchCriteriaId":"3018EE13-C0B0-4353-8D37-A1FAA419ADE4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/573","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/573","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1337","sourceIdentifier":"cve@mitre.org","published":"1999-08-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTP client in Midnight Commander (mc) before 4.5.11 stores usernames and passwords for visited sites in plaintext in the world-readable history file, which allows other local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:midnight_commander:midnight_commander:*:*:*:*:*:*:*:*","versionEndIncluding":"4.5.11","matchCriteriaId":"24D76D39-F002-44B5-857D-3E6B158AD541"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93370073207984&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/9873.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/5921","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93370073207984&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/9873.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/5921","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0671","sourceIdentifier":"cve@mitre.org","published":"1999-08-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ToxSoft NextFTP client through CWD command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:toxsoft:nextftp:1.82:*:*:*:*:*:*:*","matchCriteriaId":"1BAC287F-F1C6-4C8B-947C-B56C2199D656"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/572","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/572","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0677","sourceIdentifier":"cve@mitre.org","published":"1999-08-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WebRamp web administration utility has a default password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp_200i:1.0:*:*:*:*:*:*:*","matchCriteriaId":"DC097E3D-FB10-469C-A303-D72D5E009FFE"},{"vulnerable":true,"criteria":"cpe:2.3:h:ramp_networks:webramp_m3:1.0:*:*:*:*:*:*:*","matchCriteriaId":"697F9986-CDD4-479F-A375-53FF40C2C419"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/577","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/577","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0703","sourceIdentifier":"cve@mitre.org","published":"1999-08-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:P","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.2:*:*:*:*:*:*:*","matchCriteriaId":"F185FD65-A2A8-4170-8419-E939450055B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-066.shtml","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-066.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0719","sourceIdentifier":"cve@mitre.org","published":"1999-08-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:gnumeric:0.27:*:*:*:*:*:*:*","matchCriteriaId":"A2F12181-754A-46B3-B4DD-3DE91448F80A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/563","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/563","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0913","sourceIdentifier":"cve@mitre.org","published":"1999-08-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dfire.cgi script in Dragon-Fire IDS allows remote users to execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_security_wizards:dragon-fire_ids:1.0:*:*:*:*:*:*:*","matchCriteriaId":"1CCCA766-49E6-464D-BCC4-1B49A83BA060"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93383593909438&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/564","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93383593909438&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/564","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0682","sourceIdentifier":"cve@mitre.org","published":"1999-08-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*","matchCriteriaId":"B4F9C143-4734-4E5D-9281-F51513C5CAAF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.5:sp1:*:*:*:*:*:*","matchCriteriaId":"AD3E2F18-A369-4767-ACEF-38DB40EEC6D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.5:sp2:*:*:*:*:*:*","matchCriteriaId":"EC01670D-4550-4034-86A5-7879B6334241"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237927","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-056.shtml","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/567","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-027","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237927","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-056.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/567","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-027","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0727","sourceIdentifier":"cve@mitre.org","published":"1999-08-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A kernel leak in the OpenBSD kernel allows IPsec packets to be sent unencrypted."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6"}]}]}],"references":[{"url":"http://www.osvdb.org/6127","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6127","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1524","sourceIdentifier":"cve@mitre.org","published":"1999-08-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FlowPoint DSL router firmware versions prior to 3.0.8 allows a remote attacker to exploit a password recovery feature from the network and conduct brute force password guessing, instead of limiting the feature to the serial console port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:flowpoint:flowpoint_dsl_router:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.8","matchCriteriaId":"DAC4A180-0247-410A-8E6C-158BD81B0893"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93424680430460&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93424680430460&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0673","sourceIdentifier":"cve@mitre.org","published":"1999-08-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ALMail32 POP3 client via From: or To: headers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:crear:almail32:1.10:*:*:*:*:*:*:*","matchCriteriaId":"7192F380-2129-4E3A-B1CE-092FCF14D0AF"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/574","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/574","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0722","sourceIdentifier":"cve@mitre.org","published":"1999-08-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of Cobalt RaQ2 servers allows remote users to install arbitrary software packages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/558","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/558","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0674","sourceIdentifier":"cve@mitre.org","published":"1999-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"9DF613C9-DC4A-45F0-BEE1-8450762B0089"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"441CEF2E-9687-4930-8536-B8B83018BD28"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"55DD3C82-0B7D-4B25-B603-AD6C6D59239A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"FC7A39CD-C4B2-4FD9-A450-E5C7A5480174"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*","matchCriteriaId":"7CBA1B13-B378-4F13-BD13-EC58F15F5C81"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"B8C8CAB1-2D8C-4875-A795-41178D48410F"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"2D3C937A-E9D8-474A-ABEB-A927EF7CC5B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2A8F8DE7-7A84-4350-A6D8-FCCB561D63B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4:*:*:*:*:*:*:*","matchCriteriaId":"C422E343-ADF2-427D-865D-B5C35431EFD1"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"36DF0D51-FCFA-46A3-B834-E80DFA91DFDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5CB726CF-ADA2-4CDA-9786-1E84AC53740A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"1FC373FC-88AC-4B6D-A289-51881ACD57F7"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FF2C7C4-6F8D-40DB-9FBC-E7E4D76A2B23"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*","matchCriteriaId":"84523B48-218B-45F4-9C04-2C103612DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-067.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/570","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/j-067.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/570","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0675","sourceIdentifier":"cve@mitre.org","published":"1999-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*","matchCriteriaId":"A550C18E-F07A-4A05-87F0-B1D52FDC401C"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F543272-8C7E-4326-BA97-142FBEA641E5"}]}]}],"references":[{"url":"http://www.osvdb.org/1038","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/23615","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/576","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1038","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/23615","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/576","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0676","sourceIdentifier":"cve@mitre.org","published":"1999-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/575","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19990809134220.A1191%40hades.chaoz.org","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/575","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19990809134220.A1191%40hades.chaoz.org","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0680","sourceIdentifier":"cve@mitre.org","published":"1999-08-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238600","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-057.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/571","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-028","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238600","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-057.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/571","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-028","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0813","sourceIdentifier":"cve@mitre.org","published":"1999-08-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cfingerd with ALLOW_EXECUTION enabled does not properly drop privileges when it executes a program on behalf of the user, allowing local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:infodrom:cfingerd:*:*:*:*:*:*:*:*","versionEndIncluding":"1.4.0","matchCriteriaId":"78C34792-E014-4D8D-9D82-8E9D555664D8"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0813","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0813","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0694","sourceIdentifier":"cve@mitre.org","published":"1999-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in AIX ptrace system call allows local users to crash the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-055.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/j-055.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0814","sourceIdentifier":"cve@mitre.org","published":"1999-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Red Hat pump DHCP client allows remote attackers to gain root access in some configurations."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA-1999-027.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-1999-027.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0861","sourceIdentifier":"cve@mitre.org","published":"1999-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Race condition in the SSL ISAPI filter in IIS and other servers may leak information in plaintext."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-362"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.0:*:*:*:*:*:*:*","matchCriteriaId":"81514AB5-388D-4D13-B63A-C237A502B86A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.5:*:*:*:*:*:*:*","matchCriteriaId":"879AFDCC-B9D8-41EF-85DD-70CC1BD5227C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server_commerce:3.0:*:*:*:*:*:*:*","matchCriteriaId":"DD78B678-82A4-4485-BC4A-809A5FB105E9"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ244613","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-053","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ244613","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-053","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0867","sourceIdentifier":"cve@mitre.org","published":"1999-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in IIS 4.0 via a flood of HTTP requests with malformed headers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.0:*:*:*:*:*:*:*","matchCriteriaId":"81514AB5-388D-4D13-B63A-C237A502B86A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.5:*:*:*:*:*:*:*","matchCriteriaId":"879AFDCC-B9D8-41EF-85DD-70CC1BD5227C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:unknown:commerce:*:*:*:*:*","matchCriteriaId":"E143A482-984A-4CDC-848F-A82FA5BCFA46"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238349","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-058.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/579","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-029","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238349","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/j-058.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/579","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-029","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0875","sourceIdentifier":"cve@mitre.org","published":"1999-08-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DHCP clients with ICMP Router Discovery Protocol (IRDP) enabled allow remote attackers to modify their default routes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-16"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:0a:*:*:*:*:*:*:*","matchCriteriaId":"8429C080-F550-4D03-A87A-4546273712AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:0b:*:*:*:*:*:*:*","matchCriteriaId":"5D153766-0C57-46F4-8865-6F1ED597B53C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*","matchCriteriaId":"AA733AD2-D948-46A0-A063-D29081A56F1F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ216141","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/578","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ216141","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/578","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0724","sourceIdentifier":"cve@mitre.org","published":"1999-08-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in OpenBSD procfs and fdescfs file systems via uio_offset in the readdir() function."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6"}]}]}],"references":[{"url":"http://www.osvdb.org/6128","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6128","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1336","sourceIdentifier":"cve@mitre.org","published":"1999-08-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"3Com HiPer Access Router Card (HiperARC) 4.0 through 4.2.29 allows remote attackers to cause a denial of service (reboot) via a flood of IAC packets to the telnet port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:3com:hiperarc:*:*:*:*:*:*:*:*","versionEndIncluding":"4.2.29","matchCriteriaId":"C841828F-3170-40F5-9D53-C8D2D8EE2294"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93458364903256&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93492615408725&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6057","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93458364903256&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93492615408725&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6057","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0679","sourceIdentifier":"cve@mitre.org","published":"1999-08-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hybrid_network:hybrid_ircd:*:*:*:*:*:*:*:*","versionEndIncluding":"6.0beta58","matchCriteriaId":"CD262AC8-FF6A-429B-9D61-007EBD66E16F"},{"vulnerable":true,"criteria":"cpe:2.3:a:hybrid_network:hybrid_ircd:5.03p7:*:*:*:*:*:*:*","matchCriteriaId":"C8A0F93F-1958-4A00-99BF-6ACC2B81E54E"}]}]}],"references":[{"url":"http://www.efnet.org/archive/servers/hybrid/ChangeLog","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/581","source":"cve@mitre.org"},{"url":"http://www.efnet.org/archive/servers/hybrid/ChangeLog","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/581","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0746","sourceIdentifier":"cve@mitre.org","published":"1999-08-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A default configuration of in.identd in SuSE Linux waits 120 seconds between requests, allowing a remote attacker to conduct a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.2:*:*:*:*:*:*:*","matchCriteriaId":"852B55FE-8180-4357-B717-399C16954C6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*","matchCriteriaId":"CE0BBA4F-C61A-4A8E-A7E2-CE0DF76DF592"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"CB4C8426-CAF2-4366-94C0-1BA1C544FB6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"5CC7D746-B98B-4FAF-B816-57222759A344"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"830D48B8-D21D-4D31-99A1-20C231804DBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5C0BBDD2-9FF9-4CB7-BCAF-D4AF15DC2C7C"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*","matchCriteriaId":"BCC94EF9-5872-402F-B2FC-06331A924BB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/587","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/587","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0749","sourceIdentifier":"cve@mitre.org","published":"1999-08-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Microsoft Telnet client in Windows 95 and Windows 98 via a malformed Telnet argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/586","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-033","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/586","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-033","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0888","sourceIdentifier":"cve@mitre.org","published":"1999-08-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dbsnmp in Oracle Intelligent Agent allows local users to gain privileges by setting the ORACLE_HOME environmental variable, which dbsnmp uses to find the nmiconf.tcl script."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:7.3.3:*:*:*:*:*:*:*","matchCriteriaId":"8FE5CF5D-4649-4E3A-9328-47224065384F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:database_server:7.3.4:*:*:*:*:*:*:*","matchCriteriaId":"AE07BAF7-3A9A-426B-9536-72EAB8984A4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.3:*:*:*:*:*:*:*","matchCriteriaId":"44F4BD05-8A36-4C17-AA00-01CE12A66137"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.4:*:*:*:*:*:*:*","matchCriteriaId":"BF68DBCB-377C-476A-9373-5A85AA20916C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.5:*:*:*:*:*:*:*","matchCriteriaId":"0F492716-428E-41DF-AC50-1C8A84DBA2DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.0.5.1:*:*:*:*:*:*:*","matchCriteriaId":"AE91CC68-D396-4437-886C-370D30A771CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.1.5:*:*:*:*:*:*:*","matchCriteriaId":"42AF8B37-C5AA-4B92-A565-214A677C3486"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/585","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/585","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0753","sourceIdentifier":"cve@mitre.org","published":"1999-08-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The w3-msql CGI script provided with Mini SQL allows remote attackers to view restricted directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hughes:msql:2.0:*:*:*:*:*:*:*","matchCriteriaId":"CB8AE3D7-012D-48EE-B7F4-C70ADFA07B56"},{"vulnerable":true,"criteria":"cpe:2.3:a:hughes:msql:2.0.10:*:*:*:*:*:*:*","matchCriteriaId":"89EE371A-65B2-438B-9788-E4513E0D3461"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/591","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/591","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0745","sourceIdentifier":"cve@mitre.org","published":"1999-08-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Source Code Browser Program Database Name Server Daemon (pdnsd) for the IBM AIX C Set ++ compiler."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"28B1C99E-D05A-4778-8650-39B63CC8B2F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-059.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/590","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-059.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/590","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0747","sourceIdentifier":"cve@mitre.org","published":"1999-08-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in BSDi Symmetric Multiprocessing (SMP) when an fstat call is made when the system has a high CPU load."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"A37687D5-1239-474B-994C-C638AB9B105B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/589","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSI.4.10.9908170253560.19291-100000%40saturn.psn.net","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/589","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSI.4.10.9908170253560.19291-100000%40saturn.psn.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0725","sourceIdentifier":"cve@mitre.org","published":"1999-08-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When IIS is run with a default language of Chinese, Korean, or Japanese, it allows a remote attacker to view the source code of certain files, a.k.a. \"Double Byte Code Page\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:N/A:N","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-16"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:ja:*:*:*:*","matchCriteriaId":"9CB6F641-D384-46DA-90D2-312819E3F940"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:ko:*:*:*:*","matchCriteriaId":"AC759766-C7F3-4DF0-9128-F0302A85334C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:zh:*:*:*:*","matchCriteriaId":"ECB23C7E-9F93-47E0-A6BF-CD9A4655DDA5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:ja:*:*:*:*","matchCriteriaId":"451584D5-32CE-4773-A4CA-1E6E8AD79FE5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:ko:*:*:*:*","matchCriteriaId":"CD4AF45A-68A2-4266-84D6-7FBACBEE3908"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:zh:*:*:*:*","matchCriteriaId":"521795BA-D919-4AD1-91D9-743E6FA64A8A"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ233335","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/477","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-022","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2302","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ233335","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/477","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-022","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2302","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-0732","sourceIdentifier":"cve@mitre.org","published":"1999-08-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The logging facility of the Debian smtp-refuser package allows local users to delete arbitrary files using symbolic links."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F92AB32-E7DE-43F4-B877-1F41FA162EC7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0732","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0732","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0734","sourceIdentifier":"cve@mitre.org","published":"1999-08-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A default configuration of CiscoSecure Access Control Server (ACS) allows remote users to modify the server database without authentication."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:ciscosecure:*:*:*:*:*:*:*:*","matchCriteriaId":"8AF5945A-02FD-42F8-8478-E1CBFD783741"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3133","source":"cve@mitre.org"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-19990819-dbaccess","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3133","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-19990819-dbaccess","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0740","sourceIdentifier":"cve@mitre.org","published":"1999-08-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can cause a denial of service on Linux in.telnetd telnet daemon through a malformed TERM environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"A8EED385-8C39-4A40-A507-2EFE7652FB35"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/594","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/594","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0741","sourceIdentifier":"cve@mitre.org","published":"1999-08-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"QMS CrownNet Unix Utilities for 2060 allows root to log on without a password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qms:crownnet_unix_utilities:2060:*:*:*:*:*:*:*","matchCriteriaId":"B068C7B4-F415-413B-BB33-31A1E8F7A2E0"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/593","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/593","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0743","sourceIdentifier":"cve@mitre.org","published":"1999-08-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Trn allows local users to overwrite other users' files via symlinks."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F92AB32-E7DE-43F4-B877-1F41FA162EC7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3144","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3144","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1561","sourceIdentifier":"cve@mitre.org","published":"1999-08-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nullsoft SHOUTcast server stores the administrative password in plaintext in a configuration file (sc_serv.conf), which could allow a local user to gain administrative privileges on the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nullsoft:shoutcast_server:1.9.7:*:win32:*:*:*:*:*","matchCriteriaId":"BBF1B598-875A-4DF0-B1B7-059CE37DC05D"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/24852","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/24852","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1565","sourceIdentifier":"cve@mitre.org","published":"1999-08-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Man2html 2.1 and earlier allows local users to overwrite arbitrary files via a symlink attack on a temporary file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:earl_hood:man2html:*:*:*:*:*:*:*:*","versionEndIncluding":"2.1","matchCriteriaId":"346E204C-CD6D-4CE1-97FF-699C45A08378"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F92AB32-E7DE-43F4-B877-1F41FA162EC7"}]}]}],"references":[{"url":"http://www.osvdb.org/6291","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/24784","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/6291","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/24784","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0325","sourceIdentifier":"cve@mitre.org","published":"1999-08-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Microsoft Jet database engine allows an attacker to execute commands via a database query, aka the \"VBA Shell\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:jet:3.5:*:*:*:*:*:*:*","matchCriteriaId":"DFDB61BB-F95E-4312-9A26-5F883C951141"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:jet:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"ABF9FAA0-CCC3-4836-AC45-519E517176FD"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/548","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-030","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3155","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/548","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-030","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3155","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-1206","sourceIdentifier":"cve@mitre.org","published":"1999-08-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Apache httpd before 1.3.11, when configured for mass virtual hosting using mod_rewrite, or mod_vhost_alias in Apache 1.3.9, allows remote attackers to retrieve arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*","matchCriteriaId":"19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*","matchCriteriaId":"F715F8CB-A473-4374-8CF1-E9D74EBA5E8F"}]}]}],"references":[{"url":"http://www.apacheweek.com/issues/00-01-07#status","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"http://www.apacheweek.com/issues/00-01-07#status","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rb9c9f42dafa25d2f669dac2a536a03f2575bc5ec1be6f480618aee10%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Apache","comment":"Fixed in Apache HTTP Server 1.3.11:\nhttp://httpd.apache.org/security/vulnerabilities_13.html","lastModified":"2008-07-02T00:00:00"}]}},{"cve":{"id":"CVE-1999-0668","sourceIdentifier":"cve@mitre.org","published":"1999-08-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The scriptlet.typelib ActiveX control is marked as \"safe for scripting\" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/j-064.shtml","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240308","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/598","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-064.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240308","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/598","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0355","sourceIdentifier":"cve@mitre.org","published":"1999-08-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"pg and pb in SuSE pbpg 1.x package allows an attacker to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bent_bagger:pbpg:1.1:*:*:*:*:*:*:*","matchCriteriaId":"09E95EB9-AFE3-4362-BE10-7D85C5B34365"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"}]}]}],"references":[{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_21.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_21.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0878","sourceIdentifier":"cve@mitre.org","published":"1999-08-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via MAPPING_CHDIR."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:beroftpd:beroftpd:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"602F3F84-3DA1-4ABE-8E47-F7B54169922E"},{"vulnerable":true,"criteria":"cpe:2.3:a:beroftpd:beroftpd:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"514C8A8E-E4B0-4135-B240-379D25148AFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:beroftpd:beroftpd:1.3.4:*:*:*:*:*:*:*","matchCriteriaId":"7810EC3A-70AD-4ECB-A7EF-2CC5F527D696"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr4:*:*:*:*:*:*:*","matchCriteriaId":"B39D46C4-B153-4301-AE9C-57FB6BA64CD9"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr5:*:*:*:*:*:*:*","matchCriteriaId":"E55582DD-DEF7-4BF8-950C-E7E58BD29DE5"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr6:*:*:*:*:*:*:*","matchCriteriaId":"FF9B9132-19A1-4242-A129-E5A49F466EA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr8:*:*:*:*:*:*:*","matchCriteriaId":"0A096214-84AD-44F5-BBEF-F9F17B9B0C43"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr9:*:*:*:*:*:*:*","matchCriteriaId":"4989799F-143A-45E5-A30C-9E3203649770"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr10:*:*:*:*:*:*:*","matchCriteriaId":"1E3D0CC6-D1A0-4784-BE93-319C7EE59134"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr11:*:*:*:*:*:*:*","matchCriteriaId":"4FA32489-F098-43D2-80B7-89CFE0BE9A3A"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr12:*:*:*:*:*:*:*","matchCriteriaId":"91C6388E-464B-4562-BC7B-7B4A66387B30"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr13:*:*:*:*:*:*:*","matchCriteriaId":"923B5711-853D-4A77-8FB3-D5C3D449518D"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr14:*:*:*:*:*:*:*","matchCriteriaId":"9BB1B136-F90E-426B-8010-F2D059E89DBE"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_beta18_vr15:*:*:*:*:*:*:*","matchCriteriaId":"CD9EFCD7-2A13-420E-B6A0-C1248B2E6E2F"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr16:*:*:*:*:*:*:*","matchCriteriaId":"573486C8-0349-4BC9-AD7D-3FBF93DDB6AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.4.2_vr17:*:*:*:*:*:*:*","matchCriteriaId":"CAD81A30-9C35-4EEA-B6FE-A4AC76893AC6"},{"vulnerable":true,"criteria":"cpe:2.3:a:washington_university:wu-ftpd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"6AFFA39F-9072-4F19-A695-F383EA61D55D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/599","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/599","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1064","sourceIdentifier":"cve@mitre.org","published":"1999-08-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple buffer overflows in WindowMaker 0.52 through 0.60.0 allow attackers to cause a denial of service and possibly execute arbitrary commands by executing WindowMaker with a long program name (argv[0])."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:windowmaker:windowmaker:*:*:*:*:*:*:*:*","versionEndIncluding":"0.60.0","matchCriteriaId":"0CEC6182-2201-4DFC-89A4-E20CF819AB0F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93555317429630&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93582070508957&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/596","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93555317429630&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93582070508957&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/596","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0374","sourceIdentifier":"cve@mitre.org","published":"1999-08-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of kdm in Caldera and Mandrake Linux, and possibly other distributions, allows XDMCP connections from any host, which allows remote attackers to obtain sensitive information or bypass additional access restrictions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"86288A2E-B1BD-4DA9-BCCC-35AC44EEDD52"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.3:*:*:*:*:*:*:*","matchCriteriaId":"23B38FCC-2C86-4E84-860B-EBAE0FA123B6"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-021.0.txt","source":"cve@mitre.org"},{"url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:025","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1446","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4856","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-021.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2002:025","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1446","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4856","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0720","sourceIdentifier":"cve@mitre.org","published":"1999-08-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The pt_chown command in Linux allows local users to modify TTY terminal devices that belong to other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/597","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=lcamtuf.4.05.9907041223290.355-300000%40nimue.ids.pl","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/597","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=lcamtuf.4.05.9907041223290.355-300000%40nimue.ids.pl","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1052","sourceIdentifier":"cve@mitre.org","published":"1999-08-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*","matchCriteriaId":"0951E183-2BFE-4B19-9F06-107B5E22DBC5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93582550911564&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93582550911564&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0328","sourceIdentifier":"cve@mitre.org","published":"1999-08-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 generates predictable random TCP initial sequence numbers (ISN), which allows remote attackers to perform spoofing and session hijacking."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/604","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.1.19990824165629.00abcb40%40192.168.124.1","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-046","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/604","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.1.19990824165629.00abcb40%40192.168.124.1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-046","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0768","sourceIdentifier":"cve@mitre.org","published":"1999-08-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Vixie Cron on Red Hat systems via the MAILTO environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/602","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/602","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0769","sourceIdentifier":"cve@mitre.org","published":"1999-08-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vixie Cron on Linux systems allows local users to set parameters of sendmail commands via the MAILTO environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paul_vixie:vixie_cron:3.0_pl1:*:*:*:*:*:*:*","matchCriteriaId":"D8F45BCD-EBC1-4707-8C53-A25F373026A5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"86288A2E-B1BD-4DA9-BCCC-35AC44EEDD52"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/611","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/611","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0872","sourceIdentifier":"cve@mitre.org","published":"1999-08-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Vixie cron allows local users to gain root access via a long MAILTO environment variable in a crontab file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paul_vixie:vixie_cron:3.0_pl1:*:*:*:*:*:*:*","matchCriteriaId":"D8F45BCD-EBC1-4707-8C53-A25F373026A5"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"86288A2E-B1BD-4DA9-BCCC-35AC44EEDD52"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/611","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/759","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/611","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/759","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1235","sourceIdentifier":"cve@mitre.org","published":"1999-08-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.0 records the username and password for FTP servers in the URL history, which could allow (1) local users to read the information from another user's index.dat, or (2) people who are physically observing (\"shoulder surfing\") another user to read the information from the status bar when the user moves the mouse over a link."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind9904&L=NTBUGTRAQ&P=R179","source":"cve@mitre.org"},{"url":"http://packetderm.cotse.com/mailing-lists/ntbugtraq/1999/0364.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3289","source":"cve@mitre.org"},{"url":"http://ntbugtraq.ntadvice.com/default.asp?pid=36&sid=1&A2=ind9904&L=NTBUGTRAQ&P=R179","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://packetderm.cotse.com/mailing-lists/ntbugtraq/1999/0364.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3289","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0939","sourceIdentifier":"cve@mitre.org","published":"1999-08-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Debian IRC Epic/epic4 client via a long string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:pre_potato:*:*:*:*:*","matchCriteriaId":"2B19ABCB-70F0-450E-9A71-2EE8F2BFB2EE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/605","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/605","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0911","sourceIdentifier":"cve@mitre.org","published":"1999-08-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ProFTPD, wu-ftpd, and beroftpd allows remote attackers to gain root access via a series of MKD and CWD commands that create nested directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:proftpd_project:proftpd:1.2_pre1:*:*:*:*:*:*:*","matchCriteriaId":"CE1015CB-9A33-48D5-861A-A1FC0D8D0FA6"},{"vulnerable":true,"criteria":"cpe:2.3:a:proftpd_project:proftpd:1.2_pre2:*:*:*:*:*:*:*","matchCriteriaId":"66C825FE-91EC-43A2-9EEA-65A31DF46570"},{"vulnerable":true,"criteria":"cpe:2.3:a:proftpd_project:proftpd:1.2_pre3:*:*:*:*:*:*:*","matchCriteriaId":"1C563389-39DB-45BA-9C84-DD6837900440"},{"vulnerable":true,"criteria":"cpe:2.3:a:proftpd_project:proftpd:1.2_pre4:*:*:*:*:*:*:*","matchCriteriaId":"E2ABE74B-3D17-45D9-A87A-CE562DDB4454"},{"vulnerable":true,"criteria":"cpe:2.3:a:proftpd_project:proftpd:1.2_pre5:*:*:*:*:*:*:*","matchCriteriaId":"9166C42C-340D-4E7E-915C-BC2E4A373ACE"}]}]}],"references":[{"url":"http://www.debian.org/security/1999/19990210","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/612","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/1999/19990210","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/612","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1016","sourceIdentifier":"cve@mitre.org","published":"1999-08-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft HTML control as used in (1) Internet Explorer 5.0, (2) FrontPage Express, (3) Outlook Express 5, and (4) Eudora, and possibly others, allows remote malicious web site or HTML emails to cause a denial of service (100% CPU consumption) via large HTML form fields such as text inputs in a table cell."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:express:*:*:*:*:*","matchCriteriaId":"39EC4E10-AE31-4F20-B04E-35A14F326EB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*","matchCriteriaId":"1F71D6D7-6CB2-4BE9-839A-A5714144029C"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora:*:*:*:*:*:*:*:*","matchCriteriaId":"4E9BCC03-1C5A-4674-BE84-235B9225C074"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93578772920970&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/606","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=93578772920970&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/606","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1354","sourceIdentifier":"cve@mitre.org","published":"1999-08-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"E-mail client in Softarc FirstClass Internet Server 5.506 and earlier stores usernames and passwords in cleartext in the files (1) home.fc for version 5.506, (2) network.fc for version 3.5, or (3) FCCLIENT.LOG when logging is enabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:softarc:firstclass_internet_server:*:*:*:*:*:*:*:*","versionEndIncluding":"5.506","matchCriteriaId":"5C1B3787-4488-45B2-A2F0-1A2E055CABDE"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93637687305327&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93698283309513&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93637687305327&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93698283309513&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1513","sourceIdentifier":"cve@mitre.org","published":"1999-08-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Management information base (MIB) for a 3Com SuperStack II hub running software version 2.10 contains an object identifier (.1.3.6.1.4.1.43.10.4.2) that is accessible by a read-only community string, but lists the entire table of community strings, which could allow attackers to conduct unauthorized activities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:3com:superstack_ii_hub:2.10:*:*:*:*:*:*:*","matchCriteriaId":"41314EFC-157C-47BF-9F97-D86E9896A0B1"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93616983223090&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93616983223090&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0774","sourceIdentifier":"cve@mitre.org","published":"1999-08-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Mars NetWare Emulation (NWE, mars_nwe) package via long directory names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:martin_stover:mars_nwe:0.99:*:*:*:*:*:*:*","matchCriteriaId":"BD31E40E-AB93-48CF-8BD1-73796ADA8815"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/617","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/617","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1515","sourceIdentifier":"cve@mitre.org","published":"1999-08-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A non-default configuration in TenFour TFS Gateway 4.0 allows an attacker to cause a denial of service via messages with incorrect sender and recipient addresses, which causes the gateway to continuously try to return the message every 10 seconds."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tenfour:tfs_gateway:4.0:*:*:*:*:*:*:*","matchCriteriaId":"02292862-B566-407B-BEAF-CC2E0CC779B2"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/613","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3290","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/613","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3290","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0669","sourceIdentifier":"cve@mitre.org","published":"1999-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Eyedog ActiveX control is marked as \"safe for scripting\" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/j-064.shtml","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-064.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0670","sourceIdentifier":"cve@mitre.org","published":"1999-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:N","baseScore":4.0,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/j-064.shtml","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-064.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0705","sourceIdentifier":"cve@mitre.org","published":"1999-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in INN inews program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:*:*:*:*:*:*:*:*","matchCriteriaId":"2CFFB533-89C9-493A-851E-393D502C8A9E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/616","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/616","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0891","sourceIdentifier":"cve@mitre.org","published":"1999-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The \"download behavior\" in Internet Explorer 5 allows remote attackers to read arbitrary files via a server-side redirect."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242542","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/k-002.shtml","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/37828","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/11274","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/674","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-040","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242542","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/k-002.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/37828","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/11274","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/674","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-040","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1129","sourceIdentifier":"cve@mitre.org","published":"1999-09-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*","matchCriteriaId":"754F06BF-EB7D-4DAD-BF5D-7DF2619A7499"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:catalyst_2900_vlan:*:*:*:*:*:*:*:*","matchCriteriaId":"643219DD-5795-48F9-899D-19A27A614F90"}]}]}],"references":[{"url":"http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/1928v8x/eescg8x/aleakyv.htm","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/26008","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/615","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3294","source":"cve@mitre.org"},{"url":"http://www.cisco.com/univercd/cc/td/doc/product/lan/28201900/1928v8x/eescg8x/aleakyv.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/26008","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/615","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3294","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0685","sourceIdentifier":"cve@mitre.org","published":"1999-09-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*","matchCriteriaId":"34F6328B-44A8-4E45-918E-C54285040BFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*","matchCriteriaId":"529E3F71-6016-461D-A162-0DBDD5505389"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*","matchCriteriaId":"918BE44C-8D64-4040-BC74-802AA3FA4E10"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*","matchCriteriaId":"6AA534C4-9411-44EC-AA34-2287C79AD235"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/618","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/618","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1356","sourceIdentifier":"cve@mitre.org","published":"1999-09-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Compaq Integration Maintenance Utility as used in Compaq Insight Manager agent before SmartStart 4.50 modifies the legal notice caption (LegalNoticeCaption) and text (LegalNoticeText) in Windows NT, which could produce a legal notice that is in violation of the security policy."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:compaq:smartstart:*:*:*:*:*:*:*:*","versionEndIncluding":"4.50","matchCriteriaId":"ED239855-5A0A-4C76-806A-DEDEC9819A74"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93646669500991&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93637792706047&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93759822830815&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7763.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93646669500991&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93637792706047&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93759822830815&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7763.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1516","sourceIdentifier":"cve@mitre.org","published":"1999-09-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow in TenFour TFS Gateway SMTP mail server 3.2 allows an attacker to crash the mail server and possibly execute arbitrary code by offering more than 128 bytes in a MAIL FROM string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tenfour:tfs_gateway_smtp:3.2:*:*:*:*:*:*:*","matchCriteriaId":"F38A1780-FA97-4729-9FFA-DD730B639D10"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93677241318492&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93677241318492&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1564","sourceIdentifier":"cve@mitre.org","published":"1999-09-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD 3.2 and possibly other versions allows a local user to cause a denial of service (panic) with a large number accesses of an NFS v3 mounted directory from a large number of processes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/26166","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/26166","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0925","sourceIdentifier":"cve@mitre.org","published":"1999-09-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UnityMail allows remote attackers to conduct a denial of service via a large number of MIME headers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:messagemedia:unitymail:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0","matchCriteriaId":"472E58A9-A2A1-4F09-B6F3-5BCBB63AB40E"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90486243124867&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90486243124867&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0926","sourceIdentifier":"cve@mitre.org","published":"1999-09-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Apache allows remote attackers to conduct a denial of service via a large number of MIME headers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.2.5:*:*:*:*:*:*:*","matchCriteriaId":"AB26F3B0-04F8-43C1-9136-B85932F1C2F1"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/1998_3/0742.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/1998_3/0742.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1562","sourceIdentifier":"cve@mitre.org","published":"1999-09-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"gFTP FTP client 1.13, and other versions before 2.0.0, records a password in plaintext in (1) the log window, or (2) in a log file."},{"lang":"es","value":"El cliente de FTP gFTP versión 1.13, y otras versiones anteriores a 2.0.0 almacenan contraseñas en texto plano en (1) la ventana de registro(log) o (2) en un fichero de registro."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gftp:ftp_client:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.0","matchCriteriaId":"CA11E0CC-8164-4D79-9F4D-BC49C2BC6611"},{"vulnerable":true,"criteria":"cpe:2.3:a:gftp:ftp_client:1.13:*:*:*:*:*:*:*","matchCriteriaId":"FF5F91F2-4399-422C-BE61-36B9D9FA6045"}]}]}],"references":[{"url":"http://www.debian.org/security/2001/dsa-084","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/26915","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/3446","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2001/dsa-084","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/26915","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/3446","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0489","sourceIdentifier":"cve@mitre.org","published":"1999-09-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD, NetBSD, and OpenBSD allow an attacker to cause a denial of service by creating a large number of socket pairs using the socketpair function, setting a large buffer size via setsockopt, then writing large buffers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.5:*:*:*:*:*:*:*","matchCriteriaId":"47E02BE6-4800-4940-B269-385B66AC5077"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D0A585A1-FF82-418F-90F8-072458DB7816"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*","matchCriteriaId":"3B13D898-C1B6-44B9-8432-7DDB8A380E9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4:*:x86:*:*:*:*:*","matchCriteriaId":"4319B741-4376-4EA2-9FEB-236C148D1514"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*","matchCriteriaId":"247ABD95-74CA-45B8-8729-3C35C9E11186"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*","matchCriteriaId":"1D4C44E8-075A-4B48-88DA-2CAC25CDF159"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*","matchCriteriaId":"19D1E7AC-79B6-4136-ADB2-06BEE9773795"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*","matchCriteriaId":"E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*","matchCriteriaId":"6FA1C84C-6624-4032-8D0E-5EBB054F5224"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*","matchCriteriaId":"06B9ADAD-ADDC-47AC-9924-B31B17DDF163"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*","matchCriteriaId":"6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*","matchCriteriaId":"537FD523-1D44-4D85-AED1-C092E0155CF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.5:*:*:*:*:*:*:*","matchCriteriaId":"ACE7FDFB-C6A6-4B58-B0B4-236E4EA76EF6"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*","matchCriteriaId":"0DF053A1-C252-427E-9EEF-27240F422976"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.7:*:*:*:*:*:*:*","matchCriteriaId":"48A9C344-45AA-47B9-B35A-1A62E220D9C6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/622","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs%40ussrback.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9908270039010.16315-100000%40thetis.deor.org","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3298","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/622","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEJLCEAA.labs%40ussrback.com","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9908270039010.16315-100000%40thetis.deor.org","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3298","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1353","sourceIdentifier":"cve@mitre.org","published":"1999-09-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Nosque MsgCore 2.14 stores passwords in cleartext: (1) the administrator password in the AdmPasswd registry key, and (2) user passwords in the Userbase.dbf data file, which could allow local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nosque:msgcore:2.14:*:*:*:*:*:*:*","matchCriteriaId":"743DF18E-E2BD-4AC5-B7AA-D585F66ABB58"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93698162708211&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93698162708211&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0767","sourceIdentifier":"cve@mitre.org","published":"1999-09-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris libc, ufsrestore, and rcp via LC_MESSAGES environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=87602167420557&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=87602167420557&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0697","sourceIdentifier":"cve@mitre.org","published":"1999-09-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SCO Doctor allows local users to gain root privileges through a Tools option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"035FBF8B-EB91-4211-9979-8A9E913A54A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"B8BA72B4-C4AF-41C6-92ED-30B286E00EF5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/621","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/621","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1377","sourceIdentifier":"cve@mitre.org","published":"1999-09-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Matt Wright's download.cgi 1.0 allows remote attackers to read arbitrary files via a .. (dot dot) in the f parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:download.cgi:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0E235ED6-D87A-4770-8F1D-DBAE076E3170"}]}]}],"references":[{"url":"http://pulhas.org/phrack/55/P55-07.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://pulhas.org/phrack/55/P55-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0702","sourceIdentifier":"cve@mitre.org","published":"1999-09-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the \"ImportExportFavorites\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241361","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/627","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241361","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/627","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0910","sourceIdentifier":"cve@mitre.org","published":"1999-09-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Site Server and Commercial Internet System (MCIS) do not set an expiration for a cookie, which could then be cached by a proxy and inadvertently used by a different user."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.0:*:*:*:*:*:*:*","matchCriteriaId":"81514AB5-388D-4D13-B63A-C237A502B86A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.5:*:*:*:*:*:*:*","matchCriteriaId":"879AFDCC-B9D8-41EF-85DD-70CC1BD5227C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server_commerce:3.0:alpha:*:*:*:*:*:*","matchCriteriaId":"35EBE0A3-F521-4B04-95B7-3C57D3090A20"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/625","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-035","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/625","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-035","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1575","sourceIdentifier":"cve@mitre.org","published":"1999-09-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll) ActiveX controls for Internet Explorer (IE) 4.01 and 5.0 are marked as \"Safe for Scripting,\" which allows remote attackers to create and modify files and execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/23412","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/24839","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/26924","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/41408","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/9162","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"cve@mitre.org","tags":["Exploit"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7097","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/23412","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/24839","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/26924","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/41408","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.kb.cert.org/vuls/id/9162","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7097","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1521","sourceIdentifier":"cve@mitre.org","published":"1999-09-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Computalynx CMail 2.4 and CMail 2.3 SP2 SMTP servers are vulnerable to a buffer overflow attack in the MAIL FROM command that may allow a remote attacker to execute arbitrary code on the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:computalynx:cmail:2.3sp2:*:*:*:*:*:*:*","matchCriteriaId":"60A01A6F-35E8-408C-B772-4DF4C6A3043C"},{"vulnerable":true,"criteria":"cpe:2.3:a:computalynx:cmail:2.4:*:*:*:*:*:*:*","matchCriteriaId":"D0A15E1A-0099-4F25-A0FF-0AE55CB627D6"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93720402717560&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94121824921783&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/633","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2240","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93720402717560&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94121824921783&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/633","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2240","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0687","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D6527C0F-8052-438F-888D-44D67A9E0E6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"500C3B15-B0E5-4DEE-80EC-A1A0418365A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.1:*:*:*:*:*:*:*","matchCriteriaId":"2B9A4891-EB12-490E-9BA0-4A14A551708E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.2:*:*:*:*:*:*:*","matchCriteriaId":"0409D8C4-A512-492A-9093-CE1E78E1426E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E01901D5-F582-443B-82A3-366EB5E29C61"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.1:*:*:*:*:*:*:*","matchCriteriaId":"E4846EA2-0B0E-4EA1-A1B0-C998DD8F7635"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.120:*:*:*:*:*:*:*","matchCriteriaId":"D1B9337E-3AF1-4E76-BAC8-2B05A484C77D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*","matchCriteriaId":"8C250283-4343-4569-A6EA-988FB7319AA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0f:*:*:*:*:*:*:*","matchCriteriaId":"8237F390-43DB-4B07-9CD7-C3F804710497"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"55919E74-09E7-44BA-9941-D1B69BB1692F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/k-001.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/637","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/k-001.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/637","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0689","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D6527C0F-8052-438F-888D-44D67A9E0E6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"500C3B15-B0E5-4DEE-80EC-A1A0418365A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.1:*:*:*:*:*:*:*","matchCriteriaId":"2B9A4891-EB12-490E-9BA0-4A14A551708E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.2:*:*:*:*:*:*:*","matchCriteriaId":"0409D8C4-A512-492A-9093-CE1E78E1426E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E01901D5-F582-443B-82A3-366EB5E29C61"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.1:*:*:*:*:*:*:*","matchCriteriaId":"E4846EA2-0B0E-4EA1-A1B0-C998DD8F7635"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.120:*:*:*:*:*:*:*","matchCriteriaId":"D1B9337E-3AF1-4E76-BAC8-2B05A484C77D"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/636","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1880","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/636","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1880","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0691","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"D6527C0F-8052-438F-888D-44D67A9E0E6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"500C3B15-B0E5-4DEE-80EC-A1A0418365A8"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.1:*:*:*:*:*:*:*","matchCriteriaId":"2B9A4891-EB12-490E-9BA0-4A14A551708E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:1.2:*:*:*:*:*:*:*","matchCriteriaId":"0409D8C4-A512-492A-9093-CE1E78E1426E"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E01901D5-F582-443B-82A3-366EB5E29C61"},{"vulnerable":true,"criteria":"cpe:2.3:a:cde:cde:2.1:*:*:*:*:*:*:*","matchCriteriaId":"E4846EA2-0B0E-4EA1-A1B0-C998DD8F7635"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0d:*:*:*:*:*:*:*","matchCriteriaId":"8C250283-4343-4569-A6EA-988FB7319AA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0e:*:*:*:*:*:*:*","matchCriteriaId":"32AE5D68-92A0-4950-A6FF-ECD5F56FDD90"},{"vulnerable":true,"criteria":"cpe:2.3:o:digital:unix:4.0f:*:*:*:*:*:*:*","matchCriteriaId":"8237F390-43DB-4B07-9CD7-C3F804710497"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"55919E74-09E7-44BA-9941-D1B69BB1692F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/635","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3078","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/635","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3078","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0750","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hotmail allows Javascript to be executed via the HTML STYLE tag, allowing remote attackers to execute commands on the user's Hotmail account."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:hotmail:*:*:*:*:*:*:*:*","matchCriteriaId":"4E5C1DBF-21AF-4A3E-8A4A-42CCD6DD40C3"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/630","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/630","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0751","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Accept command in Netscape Enterprise Server 3.6 with the SSL Handshake Patch."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"4147A43C-DA7B-4D08-90E9-72DE57B1D61D"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.6:sp2:*:*:*:*:*:*","matchCriteriaId":"4EB62E6F-87E2-4A98-B4BD-3E0036CE7640"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/631","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3256","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/631","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3256","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0759","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FuseMAIL POP service via long USER and PASS commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fuseware:fusemail:2.7:*:*:*:*:*:*:*","matchCriteriaId":"3E76CAF3-6B56-49F2-B774-D1FB3147540F"}]}]}],"references":[{"url":"http://www.crosswinds.net/~fuseware/faq.html#8","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/634","source":"cve@mitre.org"},{"url":"http://www.crosswinds.net/~fuseware/faq.html#8","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/634","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1014","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in mail command in Solaris 2.7 and 2.7 allows local users to gain privileges via a long -m argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93727925026476&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93846422810162&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/672","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3297","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93727925026476&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93846422810162&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/672","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3297","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1053","sourceIdentifier":"cve@mitre.org","published":"1999-09-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"guestbook.pl cleanses user-inserted SSI commands by removing text between \"<!--\" and \"-->\" separators, which allows remote attackers to execute arbitrary commands when guestbook.pl is run on Apache 1.3.9 and possibly other versions, since Apache allows other closing sequences besides \"-->\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*","matchCriteriaId":"19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:matt_wright_guestbook:2.3:*:*:*:*:*:*:*","matchCriteriaId":"68093AEC-1493-486F-BD00-3E90A505E035"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/33674","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/82/27296","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/82/27560","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/776","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/33674","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/82/27296","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/82/27560","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/776","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0817","sourceIdentifier":"cve@mitre.org","published":"1999-09-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lynx WWW client allows a remote attacker to specify command-line parameters which Lynx uses when calling external programs to handle certain protocols, e.g. telnet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_kansas:lynx:*:*:*:*:*:*:*:*","matchCriteriaId":"6ED57818-7105-4465-92BB-9039C929C02A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0817","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0817","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0704","sourceIdentifier":"cve@mitre.org","published":"1999-09-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*","matchCriteriaId":"950CE88E-E396-4D32-AC9D-B76EB2B537C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"A37687D5-1239-474B-994C-C638AB9B105B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/614","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/614","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0890","sourceIdentifier":"cve@mitre.org","published":"1999-09-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"iHTML Merchant allows remote attackers to obtain sensitive information or execute commands via a code parsing error."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ihtml_merchant:ihtml_merchant:*:*:*:*:*:*:*:*","matchCriteriaId":"B0A084FF-96DE-4EDD-9C41-DCBA54ACFC8C"}]}]}],"references":[{"url":"http://www.ihtmlmerchant.com/support_patches_feedback.htm","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/694","source":"cve@mitre.org"},{"url":"http://www.ihtmlmerchant.com/support_patches_feedback.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/694","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0907","sourceIdentifier":"cve@mitre.org","published":"1999-09-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"sccw allows local users to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:steven_j._merrifield:soundcard_cw:1.1:*:linux:*:*:*:*:*","matchCriteriaId":"A99542E6-89F0-4459-A5FA-F04C14DFB10B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0907","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0907","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0953","sourceIdentifier":"cve@mitre.org","published":"1999-09-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WWWBoard stores encrypted passwords in a password file that is under the web root and thus accessible by remote attackers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:wwwboard:2.0_alpha_2.1:*:*:*:*:*:*:*","matchCriteriaId":"C90C4757-D39C-4C19-B183-61C244F4EAA7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0953","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0953","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0954","sourceIdentifier":"cve@mitre.org","published":"1999-09-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WWWBoard has a default username and default password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:wwwboard:2.0_alpha_2:*:*:*:*:*:*:*","matchCriteriaId":"5525A19D-52D5-445A-83DE-1B8D440340C7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/649","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/649","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0787","sourceIdentifier":"cve@mitre.org","published":"1999-09-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SSH authentication agent follows symlinks via a UNIX domain socket."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"338EDA76-05D6-48C0-952E-6244A5F206F3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93760201002154&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93832856804415&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/660","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93760201002154&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93832856804415&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/660","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0886","sourceIdentifier":"cve@mitre.org","published":"1999-09-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The security descriptor for RASMAN allows users to point to an alternate location via the Windows NT Service Control Manager."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C","baseScore":9.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-16"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242294","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/645","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-041","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242294","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/645","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-041","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0909","sourceIdentifier":"cve@mitre.org","published":"1999-09-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multihomed Windows systems allow a remote attacker to bypass IP source routing restrictions via a malformed packet with IP options, aka the \"Spoofed Route Pointer\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:0a:*:*:*:*:*:*:*","matchCriteriaId":"8429C080-F550-4D03-A87A-4546273712AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:0b:*:*:*:*:*:*:*","matchCriteriaId":"5D153766-0C57-46F4-8865-6F1ED597B53C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*","matchCriteriaId":"AA733AD2-D948-46A0-A063-D29081A56F1F"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238453","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/646","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-038","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238453","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/646","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-038","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0708","sourceIdentifier":"cve@mitre.org","published":"1999-09-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:infodrom:cfingerd:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"3C6DB288-F853-4014-A3E7-751EBE34536E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/651","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/651","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0786","sourceIdentifier":"cve@mitre.org","published":"1999-09-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The dynamic linker in Solaris allows a local user to create arbitrary files via the LD_PROFILE environmental variable and a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/659","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/659","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0912","sourceIdentifier":"cve@mitre.org","published":"1999-09-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD VFS cache (vfs_cache) allows local users to cause a denial of service by opening a large number of files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"}]}]}],"references":[{"url":"http://www.osvdb.org/1079","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/653","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1079","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/653","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0777","sourceIdentifier":"cve@mitre.org","published":"1999-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS FTP servers may allow a remote attacker to read or delete files on the server, even if they have \"No Access\" permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.5:*:*:*:*:*:*:*","matchCriteriaId":"879AFDCC-B9D8-41EF-85DD-70CC1BD5227C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241407","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242559","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/658","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241407","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ242559","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/658","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0906","sourceIdentifier":"cve@mitre.org","published":"1999-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in sccw allows local users to gain root access via the HOME environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/656","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/656","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0908","sourceIdentifier":"cve@mitre.org","published":"1999-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Solaris TCP streams driver via a malicious connection that causes the server to panic as a result of recursive calls to mutex_enter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/655","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/655","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1013","sourceIdentifier":"cve@mitre.org","published":"1999-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"named-xfer in AIX 4.1.5 and 4.2.1 allows members of the system group to overwrite system files to gain root access via the -f parameter and a malformed zone file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93837026726954&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/673","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93837026726954&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/673","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1477","sourceIdentifier":"cve@mitre.org","published":"1999-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in GNOME libraries 1.0.8 allows local user to gain root access via a long --espeaker argument in programs such as nethack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gnome_libs:1.0.8:*:*:*:*:*:*:*","matchCriteriaId":"F677491A-EB46-4AF3-BD85-00FF56E1F546"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"D323A6B7-2741-4F31-B0D6-5D6FB738A2A1"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/28717","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/663","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3349","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/28717","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/663","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3349","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1534","sourceIdentifier":"cve@mitre.org","published":"1999-09-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in (1) nlservd and (2) rnavc in Knox Software Arkeia backup product allows local users to obtain root access via a long HOME environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:knox_software:arkeia:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E4C2000A-26CC-4CC6-B2DD-73BD1C57D60C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93837184228248&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/661","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93837184228248&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/661","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1351","sourceIdentifier":"cve@mitre.org","published":"1999-09-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in KVIrc IRC client 0.9.0 with the \"Listen to !nick <soundname> requests\" option enabled allows remote attackers to read arbitrary files via a .. (dot dot) in a DCC GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kvirc:irc_client:0.9.0:*:*:*:*:*:*:*","matchCriteriaId":"F1022B58-B1B1-4935-B0DB-01B8C5575051"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93845560631314&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7761.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93845560631314&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7761.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1484","sourceIdentifier":"cve@mitre.org","published":"1999-09-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in MSN Setup BBS 4.71.0.10 ActiveX control (setupbbs.ocx) allows a remote attacker to execute arbitrary commands via the methods (1) vAddNewsServer or (2) bIsNewsServerConfigured."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:msn_setup_bulletin_board_services:4.71.0.10:*:*:*:*:*:*:*","matchCriteriaId":"E7A77FB8-F051-4B7B-ADB4-7B484765A7B2"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/28719","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/668","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3310","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/28719","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/668","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3310","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1578","sourceIdentifier":"cve@mitre.org","published":"1999-09-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Registration Wizard ActiveX control (regwizc.dll, InvokeRegWizard) 3.0.0.0 for Internet Explorer 4.01 and 5 allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/37556","source":"cve@mitre.org","tags":["Exploit","Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/671","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3311","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/37556","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/671","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3311","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0788","sourceIdentifier":"cve@mitre.org","published":"1999-09-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Arkiea nlservd allows remote attackers to conduct a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:knox_software:arkeia:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E4C2000A-26CC-4CC6-B2DD-73BD1C57D60C"},{"vulnerable":true,"criteria":"cpe:2.3:a:knox_software:arkeia:4.1:*:*:*:*:*:*:*","matchCriteriaId":"89C0FD29-7836-4566-AB30-1EB455F2DB54"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93837184228248&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/662","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93837184228248&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/662","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0940","sourceIdentifier":"cve@mitre.org","published":"1999-09-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in mutt mail client allows remote attackers to execute commands via malformed MIME messages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mutt:mutt_mail_client:*:*:*:*:*:*:*:*","matchCriteriaId":"2A691003-779A-46E5-9625-678D90C10AB0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0940","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0940","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1576","sourceIdentifier":"cve@mitre.org","published":"1999-09-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Adobe Acrobat ActiveX control (pdf.ocx, PDF.PdfCtrl.1) 1.3.188 for Acrobat Reader 4.0 allows remote attackers to execute arbitrary code via the pdf.setview method."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adobe:acrobat_reader:4.0:*:*:*:*:*:*:*","matchCriteriaId":"F509566A-6D4A-40C0-8A16-F8765C5DCAAF"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/25919","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/666","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3318","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/25919","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/666","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3318","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0789","sourceIdentifier":"cve@mitre.org","published":"1999-09-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AIX ftpd in the libc library."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"55919E74-09E7-44BA-9941-D1B69BB1692F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/j-072.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/679","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/j-072.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/679","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1352","sourceIdentifier":"cve@mitre.org","published":"1999-09-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"mknod in Linux 2.2 follows symbolic links, which could allow local users to overwrite files or gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"146F7A77-A950-4CAD-BDA9-C239696F569D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93855134409747&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93855134409747&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1350","sourceIdentifier":"cve@mitre.org","published":"1999-09-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ARCAD Systemhaus 0.078-5 installs critical programs and files with world-writeable permissions, which could allow local users to gain privileges by replacing a program with a Trojan horse."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arcad_systemhaus:arcad:0.078_5:*:*:*:*:*:*:*","matchCriteriaId":"B05113AB-8A94-4AE0-B012-FFEE2EC300C9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93871933521519&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93871933521519&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0931","sourceIdentifier":"cve@mitre.org","published":"1999-09-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Mediahouse Statistics Server allows remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediahouse_software:statistics_server:4.28:*:*:*:*:*:*:*","matchCriteriaId":"23874677-B5B3-4485-BD19-168E2693A048"},{"vulnerable":true,"criteria":"cpe:2.3:a:mediahouse_software:statistics_server:5.0:*:*:*:*:*:*:*","matchCriteriaId":"F4D3F01D-6EBC-436E-9E56-5CE14081D132"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/734","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/734","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0932","sourceIdentifier":"cve@mitre.org","published":"1999-09-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Mediahouse Statistics Server allows remote attackers to read the administrator password, which is stored in cleartext in the ss.cfg file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mediahouse_software:statistics_server:4.28:*:*:*:*:*:*:*","matchCriteriaId":"23874677-B5B3-4485-BD19-168E2693A048"},{"vulnerable":true,"criteria":"cpe:2.3:a:mediahouse_software:statistics_server:5.1:*:*:*:*:*:*:*","matchCriteriaId":"6250AF10-CCBB-4FD9-8C13-1C6EE9725C6A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/735","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/735","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1469","sourceIdentifier":"cve@mitre.org","published":"1999-09-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in w3-auth CGI program in miniSQL package allows remote attackers to execute arbitrary commands via an HTTP request with (1) a long URL, or (2) a long User-Agent MIME header."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hughes_technologies:w3-auth:*:*:*:*:*:*:*:*","matchCriteriaId":"A7E02158-098A-4D46-AF4E-FCD46BDF722B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93871926821410&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93871926821410&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1583","sourceIdentifier":"cve@mitre.org","published":"1999-09-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in nslookup for AIX 4.3 allows local users to execute arbitrary code via a long hostname command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"}]}]}],"references":[{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IY02120&apar=only","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://www.kb.cert.org/vuls/id/872443","source":"cve@mitre.org","tags":["Patch","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8031","source":"cve@mitre.org"},{"url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IY02120&apar=only","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"http://www.kb.cert.org/vuls/id/872443","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/8031","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0794","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Excel does not warn a user when a macro is present in a Symbolic Link (SYLK) format file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:excel:*:*:*:*:*:*:*:*","matchCriteriaId":"7973AE7A-FE9F-4AB8-BBA8-98F3AF25487C"},{"vulnerable":false,"criteria":"cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*","matchCriteriaId":"49AD45BF-8A91-4C87-AF15-D38D8468A4C5"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241900","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241901","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241902","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-044","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241900","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241901","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ241902","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-044","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0877","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5 allows remote attackers to read files via an ExecCommand method called on an IFRAME."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:P/I:N/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.01:*:*:*:*:*:*:*","matchCriteriaId":"B9D82B89-456D-41CB-A894-B6A22FB4415D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.01:sp1:*:*:*:*:*:*","matchCriteriaId":"2E21CE6E-2B33-4225-B1DC-C19F1D578040"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243638","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-042","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243638","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-042","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0879","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in WU-FTPD and related FTP servers allows remote attackers to gain root privileges via macro variables in a message file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","matchCriteriaId":"99235B00-0050-42BF-99EF-FCDD72D8627D"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0879","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0879","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0880","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in WU-FTPD via the SITE NEWER command, which does not free memory properly."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*","matchCriteriaId":"766851E2-134A-4A89-931B-6F1753525684"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*","matchCriteriaId":"99235B00-0050-42BF-99EF-FCDD72D8627D"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"ABC52A20-B706-432D-9A15-45F48EB1B08B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0880","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0880","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0933","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TeamTrack web server allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:teamshare:teamtrack:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4D408A75-F191-4470-844B-E5CCA0219737"}]}]}],"references":[{"url":"http://www.osvdb.org/1096","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/689","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1096","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/689","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1236","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Anywhere Mail Server 2.3.1 stores passwords in plaintext in the msgboxes.dbf file, which could allow local users to gain privileges by extracting the passwords from msgboxes.dbf."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:true_north:internet_anywhere_mail_server:2.3.1:*:*:*:*:*:*:*","matchCriteriaId":"E35F96E1-E254-4CBA-856A-8772BC31F374"},{"vulnerable":true,"criteria":"cpe:2.3:a:true_north:internet_anywhere_mail_server:3.1:*:*:*:*:*:*:*","matchCriteriaId":"B09BD4FD-C2A8-4272-8E48-051E5416FEBA"}]}]}],"references":[{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9910&L=ntbugtraq&F=&S=&P=662","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/731","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3285","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9910&L=ntbugtraq&F=&S=&P=662","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/731","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3285","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1500","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Anywhere POP3 Mail Server 2.3.1 allows remote attackers to cause a denial of service (crash) via (1) LIST, (2) TOP, or (3) UIDL commands using letters as arguments."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:true_north:internet_anywhere_mail_server:2.3:*:*:*:*:*:*:*","matchCriteriaId":"BCA7F1F4-1C43-4196-93E8-D38DCB8624B7"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93880357530599&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/733","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=93880357530599&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/733","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0016","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Internet Anywhere POP3 Mail Server allows remote attackers to cause a denial of service or execute commands via a long username."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:true_north:internet_anywhere_mail_server:2.3:*:*:*:*:*:*:*","matchCriteriaId":"BCA7F1F4-1C43-4196-93E8-D38DCB8624B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:true_north:internet_anywhere_mail_server:2.3.1:*:*:*:*:*:*:*","matchCriteriaId":"E35F96E1-E254-4CBA-856A-8772BC31F374"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/730","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/730","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0047","sourceIdentifier":"cve@mitre.org","published":"1999-10-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Yahoo Pager/Messenger client allows remote attackers to cause a denial of service via a long URL within a message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yahoo:pager:733:*:*:*:*:*:*:*","matchCriteriaId":"694E838D-5513-43D1-9A1B-659E4224B948"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0047","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0047","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0942","sourceIdentifier":"cve@mitre.org","published":"1999-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UnixWare dos7utils allows a local user to gain root privileges by using the STATICMERGE environmental variable to find a script which it executes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0942","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0942","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1454","sourceIdentifier":"cve@mitre.org","published":"1999-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Macromedia \"The Matrix\" screen saver on Windows 95 with the \"Password protected\" option enabled allows attackers with physical access to the machine to bypass the password prompt by pressing the ESC (Escape) key."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:macromedia:matrix_screen_saver:*:*:*:*:*:*:*:*","matchCriteriaId":"A5DEDA15-AA6C-4699-95FB-DE4E45198AD9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93915027622690&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93915027622690&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1523","sourceIdentifier":"cve@mitre.org","published":"1999-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Sambar Web Server 4.2.1 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long HTTP GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sambar:sambar_server:*:*:*:*:*:*:*:*","matchCriteriaId":"83D8ABA8-038A-48E2-B2E4-796BDF2E2BAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:sambar:sambar_server:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"D9F5F4F3-A2EC-4F9E-BB96-16F43666F792"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93901161727373&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93941351229256&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1672","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93901161727373&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93941351229256&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1672","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1540","sourceIdentifier":"cve@mitre.org","published":"1999-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"shell-lock in Cactus Software Shell Lock uses weak encryption (trivial encoding) which allows attackers to easily decrypt and obtain the source code."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cactus_software:shell-lock:*:*:*:*:*:*:*:*","matchCriteriaId":"931780A6-580D-41AA-A0CB-4ADDA1448F26"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93916168802365&w=2","source":"cve@mitre.org"},{"url":"http://www.atstake.com/research/advisories/1999/shell-lock.txt","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3356","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93916168802365&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.atstake.com/research/advisories/1999/shell-lock.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3356","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1541","sourceIdentifier":"cve@mitre.org","published":"1999-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"shell-lock in Cactus Software Shell Lock allows local users to read or modify decoded shell files before they are executed, via a symlink attack on a temporary file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cactus_software:shell-lock:*:*:*:*:*:*:*:*","matchCriteriaId":"931780A6-580D-41AA-A0CB-4ADDA1448F26"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93916168802365&w=2","source":"cve@mitre.org"},{"url":"http://www.atstake.com/research/advisories/1999/shell-lock.txt","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3358","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93916168802365&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.atstake.com/research/advisories/1999/shell-lock.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3358","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1542","sourceIdentifier":"cve@mitre.org","published":"1999-10-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RPMMail before 1.4 allows remote attackers to execute commands via an e-mail message with shell metacharacters in the \"MAIL FROM\" command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93915641729415&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93923853105687&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3353","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93915641729415&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93923853105687&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3353","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1344","sourceIdentifier":"cve@mitre.org","published":"1999-10-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Auto_FTP.pl script in Auto_FTP 0.2 stores usernames and passwords in plaintext in the auto_ftp.conf configuration file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:auto_ftp:auto_ftp:0.2:*:*:*:*:*:*:*","matchCriteriaId":"368229D8-CDF9-4665-9378-088E4DC0E28D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93923873006014&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93923873006014&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1345","sourceIdentifier":"cve@mitre.org","published":"1999-10-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Auto_FTP.pl script in Auto_FTP 0.2 uses the /tmp/ftp_tmp as a shared directory with insecure permissions, which allows local users to (1) send arbitrary files to the remote server by placing them in the directory, and (2) view files that are being transferred."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:auto_ftp:auto_ftp:0.2:*:*:*:*:*:*:*","matchCriteriaId":"368229D8-CDF9-4665-9378-088E4DC0E28D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93923873006014&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93923873006014&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1357","sourceIdentifier":"cve@mitre.org","published":"1999-10-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Communicator 4.04 through 4.7 (and possibly other versions) in various UNIX operating systems converts the 0x8b character to a \"<\" sign, and the 0x9b character to a \">\" sign, which could allow remote attackers to attack other clients via cross-site scripting (CSS) in CGI programs that do not filter these characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:*:*:*:*:*:*:*:*","versionEndIncluding":"4.7","matchCriteriaId":"5921E5E6-3D97-4075-B557-968340FB6E7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.04:*:*:*:*:*:*:*","matchCriteriaId":"94F9EFE4-7853-4809-8D94-03B3EFD739E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*","matchCriteriaId":"918BE44C-8D64-4040-BC74-802AA3FA4E10"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93915331626185&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93915331626185&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0791","sourceIdentifier":"cve@mitre.org","published":"1999-10-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hybrid Network cable modems do not include an authentication mechanism for administration, allowing remote attackers to compromise the system through the HSMP protocol."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hybrid_network:hsmp:*:*:*:*:*:*:*:*","matchCriteriaId":"7C3C4C43-D51B-41A5-8403-6054CB88DE4F"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:hybrid_network:cable_modem:*:*:*:*:*:*:*:*","matchCriteriaId":"C4E7CAB1-E796-46AE-90E7-AB88C6126C71"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/695","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/695","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1349","sourceIdentifier":"cve@mitre.org","published":"1999-10-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NFS daemon (nfsd.exe) for Omni-NFS/X 6.1 allows remote attackers to cause a denial of service (resource exhaustion) via certain packets, possibly with the Urgent (URG) flag set, to port 111."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xlink_technology:omni-nfs_x_enterprise:6.1:*:*:*:*:*:*:*","matchCriteriaId":"B07E1D03-763D-40B1-9514-172781BDAC86"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93923679004325&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93923679004325&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1346","sourceIdentifier":"cve@mitre.org","published":"1999-10-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","versionEndIncluding":"6.1","matchCriteriaId":"143809B4-A40E-426D-9800-C268AECBCA88"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93942774609925&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93942774609925&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1347","sourceIdentifier":"cve@mitre.org","published":"1999-10-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Xsession in Red Hat Linux 6.1 and earlier can allow local users with restricted accounts to bypass execution of the .xsession file by starting kde, gnome or anotherlevel from kdm."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","versionEndIncluding":"6.1","matchCriteriaId":"143809B4-A40E-426D-9800-C268AECBCA88"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93942774609925&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93942774609925&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1522","sourceIdentifier":"cve@mitre.org","published":"1999-10-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in htmlparse.pike in Roxen Web Server 1.3.11 and earlier, possibly related to recursive parsing and referer tags in RXML."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:roxen:roxen_web_server:*:*:*:*:*:*:*:*","versionEndIncluding":"1.3.11","matchCriteriaId":"37737BF2-0E4D-4D2F-B5E9-A355FC9C6426"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93942579008408&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93942579008408&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1082","sourceIdentifier":"cve@mitre.org","published":"1999-10-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Jana proxy web server 1.40 allows remote attackers to ready arbitrary files via a \"......\" (modified dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:t._hauck:jana_web_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"09026053-0568-4D8F-AEB0-F7850C655635"},{"vulnerable":true,"criteria":"cpe:2.3:a:t._hauck:jana_web_server:1.40:*:*:*:*:*:*:*","matchCriteriaId":"35AE9E3D-2E36-47E3-9B24-746DA7252029"},{"vulnerable":true,"criteria":"cpe:2.3:a:t._hauck:jana_web_server:1.45:*:*:*:*:*:*:*","matchCriteriaId":"5C0BC837-4993-4780-B4B0-88D4C1A42BD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:t._hauck:jana_web_server:1.46:*:*:*:*:*:*:*","matchCriteriaId":"D4505B16-611E-422F-995D-748281466621"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93941794201059&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/699","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93941794201059&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/699","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1083","sourceIdentifier":"cve@mitre.org","published":"1999-10-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Jana proxy web server 1.45 allows remote attackers to ready arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:t._hauck:jana_web_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"09026053-0568-4D8F-AEB0-F7850C655635"},{"vulnerable":true,"criteria":"cpe:2.3:a:t._hauck:jana_web_server:1.45:*:*:*:*:*:*:*","matchCriteriaId":"5C0BC837-4993-4780-B4B0-88D4C1A42BD5"},{"vulnerable":true,"criteria":"cpe:2.3:a:t._hauck:jana_web_server:1.46:*:*:*:*:*:*:*","matchCriteriaId":"D4505B16-611E-422F-995D-748281466621"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95730430727064&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/699","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://marc.info/?l=bugtraq&m=95730430727064&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/699","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-2000-0369","sourceIdentifier":"cve@mitre.org","published":"1999-10-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The IDENT server in Caldera Linux 2.3 creates multiple threads for each IDENT request, which allows remote attackers to cause a denial of service."},{"lang":"es","value":"El servidor IDENT de Caldera Linux 2.3 crea múltiples hilos para cada petición IDENT, lo que permite a atacantes remotos causar una denegación de servicio."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.3:*:*:*:*:*:*:*","matchCriteriaId":"23B38FCC-2C86-4E84-860B-EBAE0FA123B6"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-029.1.txt","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1266","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-029.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1266","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0893","sourceIdentifier":"cve@mitre.org","published":"1999-10-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"userOsa in SCO OpenServer allows local users to corrupt files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0893","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0893","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1343","sourceIdentifier":"cve@mitre.org","published":"1999-10-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HTTP server for Xerox DocuColor 4 LP allows remote attackers to cause a denial of service (hang) via a long URL that contains a large number of . characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:xerox:docucolor_4lp:*:*:*:*:*:*:*:*","matchCriteriaId":"21AEC119-CE59-47AC-843E-DE1694A3B818"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93986405412867&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93986405412867&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0356","sourceIdentifier":"cve@mitre.org","published":"1999-10-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pluggable Authentication Modules (PAM) in Red Hat Linux 6.1 does not properly lock access to disabled NIS accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/697","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=1789","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/697","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=1789","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0943","sourceIdentifier":"cve@mitre.org","published":"1999-10-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in OpenLink 3.2 allows remote attackers to gain privileges via a long GET request to the web configurator."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openlink:openlink:a:*:*:*:*:*:*:*","matchCriteriaId":"7E794EB7-79BB-4359-B642-75AE9E554F16"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/720","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/720","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1342","sourceIdentifier":"cve@mitre.org","published":"1999-10-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ICQ ActiveList Server allows remote attackers to cause a denial of service (crash) via malformed packets to the server's UDP port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:icq:activelist_server:*:*:*:*:*:*:*:*","matchCriteriaId":"6844DD0E-8AE8-48A9-9355-ABBC59BC1FEA"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=94042342010662&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94042342010662&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1047","sourceIdentifier":"cve@mitre.org","published":"1999-10-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When BSDI patches for Gauntlet 5.0 BSDI are installed in a particular order, Gauntlet allows remote attackers to bypass firewall access restrictions, and does not log the activities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bsdi:gauntlet:5.0:*:*:*:*:*:*:*","matchCriteriaId":"8FB453C2-51F4-4CEB-91BD-E913CCE1F5B9"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94026690521279&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94036662326185&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/3397.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94026690521279&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94036662326185&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/3397.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0895","sourceIdentifier":"cve@mitre.org","published":"1999-10-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Firewall-1 does not properly restrict access to LDAP attributes."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F543272-8C7E-4326-BA97-142FBEA641E5"}]}]}],"references":[{"url":"http://www.osvdb.org/1117","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/725","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991020150002.21047.qmail%40tarjan.mediaways.net","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1117","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/725","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991020150002.21047.qmail%40tarjan.mediaways.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0766","sourceIdentifier":"cve@mitre.org","published":"1999-10-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Microsoft Java Virtual Machine allows a malicious Java applet to execute arbitrary commands outside of the sandbox environment."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-16"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:a:microsoft:internet_explorer:6.0.2900:*:*:*:*:*:*:*","matchCriteriaId":"7B90EA4B-DA10-44B7-BD3D-6AE1197212D5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:java_virtual_machine:*:*:*:*:*:*:*:*","matchCriteriaId":"AED74665-46EF-4373-A429-C201EAE1E4C2"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240346","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/600","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-031","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ240346","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/600","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-031","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0905","sourceIdentifier":"cve@mitre.org","published":"1999-10-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Axent Raptor firewall via malformed zero-length IP options."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:axent:raptor_firewall:*:*:*:*:*:*:*:*","matchCriteriaId":"AC858FDD-D2A4-49DF-B36B-8641F4410130"}]}]}],"references":[{"url":"http://www.osvdb.org/1121","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/736","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1121","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/736","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0327","sourceIdentifier":"cve@mitre.org","published":"1999-10-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Virtual Machine (VM) allows remote attackers to escape the Java sandbox and execute commands via an applet containing an illegal cast operation, aka the \"Virtual Machine Verifier\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*","matchCriteriaId":"A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*","matchCriteriaId":"DC2655D3-B360-4F82-B9CE-EECC95E0FAEE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93993545118416&w=2","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93993545118416&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-045","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0951","sourceIdentifier":"cve@mitre.org","published":"1999-10-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in OmniHTTPd CGI program imagemap.exe allows remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:omnicron:omnihttpd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"0908E70E-2609-46F7-B09B-862F85B1B5C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:omnicron:omnihttpd:2.4pro:*:*:*:*:*:*:*","matchCriteriaId":"6B7B96C7-EB32-45AC-BCD2-F5DE009E104A"}]}]}],"references":[{"url":"http://www.osvdb.org/3380","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/739","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3380","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/739","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1341","sourceIdentifier":"cve@mitre.org","published":"1999-10-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux kernel before 2.3.18 or 2.2.13pre15, with SLIP and PPP options, allows local unprivileged users to forge IP packets via the TIOCSETD option on tty devices."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.2.0","versionEndIncluding":"2.2.13","matchCriteriaId":"145E3348-78A6-46D6-BC2C-21F5AB5DE4FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionStartIncluding":"2.3.0","versionEndExcluding":"2.3.18","matchCriteriaId":"05E1CCDA-7C67-46C5-B6F0-324A5DCE0E47"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94061108411308&w=2","source":"cve@mitre.org","tags":["Mailing List","Third Party Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7858","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://marc.info/?l=bugtraq&m=94061108411308&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mailing List","Third Party Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7858","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-2000-0362","sourceIdentifier":"cve@mitre.org","published":"1999-10-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Linux cdwtools 093 and earlier allows local users to gain root privileges."},{"lang":"es","value":"Desbordamiento de buffer en cdwtools de Linux, versión 093 y  anteriores, que permite a usuarios locales conseguir privilegios de root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"}]}]}],"references":[{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_25.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/738","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_25.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/738","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0363","sourceIdentifier":"cve@mitre.org","published":"1999-10-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux cdwtools 093 and earlier allows local users to gain root privileges via the /tmp directory."},{"lang":"es","value":"cdwtools 093 y anteriores de Linux permite a usuarios locales obtener privilegios de root a través del directorio /tmp."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"}]}]}],"references":[{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_25.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/738","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_25.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/738","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0900","sourceIdentifier":"cve@mitre.org","published":"1999-10-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linux-nis:rpc.yppasswdd:*:*:*:*:*:*:*:*","matchCriteriaId":"FAAC790B-89D2-411A-BC0C-D0A5F85D49C3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0900","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0900","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0901","sourceIdentifier":"cve@mitre.org","published":"1999-10-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ypserv allows a local user to modify the GECOS and login shells of other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linux-nis:ypserv:*:*:*:*:*:*:*:*","matchCriteriaId":"4BA59589-2AD0-48F3-9879-7BB2F47E9884"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0901","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0901","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0902","sourceIdentifier":"cve@mitre.org","published":"1999-10-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ypserv allows local administrators to modify password tables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:linux-nis:ypserv:*:*:*:*:*:*:*:*","matchCriteriaId":"4BA59589-2AD0-48F3-9879-7BB2F47E9884"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0902","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0902","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0944","sourceIdentifier":"cve@mitre.org","published":"1999-10-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM WebSphere ikeyman tool uses weak encryption to store a password for a key database that is used for SSL connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0944","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0944","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0883","sourceIdentifier":"cve@mitre.org","published":"1999-10-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Zeus web server allows remote attackers to read arbitrary files by specifying the file name in an option to the search engine."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"1D7BD6BD-8945-45FC-909B-853BBD328618"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.2:*:*:*:*:*:*:*","matchCriteriaId":"C9DBE4CC-5AAA-415E-9C2D-5B559377643B"}]}]}],"references":[{"url":"http://www.osvdb.org/1126","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/742","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3380","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1126","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/742","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3380","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0884","sourceIdentifier":"cve@mitre.org","published":"1999-10-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Zeus web server administrative interface uses weak encryption for its passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"1D7BD6BD-8945-45FC-909B-853BBD328618"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.2:*:*:*:*:*:*:*","matchCriteriaId":"C9DBE4CC-5AAA-415E-9C2D-5B559377643B"}]}]}],"references":[{"url":"http://www.osvdb.org/8186","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/742","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3833","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8186","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/742","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3833","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0881","sourceIdentifier":"cve@mitre.org","published":"1999-10-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Falcon web server allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:blueface:falcon_web_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"6404568E-CD7E-4F7A-B630-598DE2852FBA"}]}]}],"references":[{"url":"http://www.osvdb.org/1127","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/743","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1127","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/743","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0903","sourceIdentifier":"cve@mitre.org","published":"1999-10-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"genfilt in the AIX Packet Filtering Module does not properly filter traffic to destination ports greater than 32767."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0903","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0903","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1076","sourceIdentifier":"cve@mitre.org","published":"1999-10-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Idle locking function in MacOS 9 allows local users to bypass the password protection of idled sessions by selecting the \"Log Out\" option and selecting a \"Cancel\" option in the dialog box for an application that attempts to verify that the user wants to log out, which returns the attacker into the locked session."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:9:*:*:*:*:*:*:*","matchCriteriaId":"9D22617D-622E-442B-A2C7-C2571978DC42"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94096348604173&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/745","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94096348604173&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/745","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1234","sourceIdentifier":"cve@mitre.org","published":"1999-10-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"LSA (LSASS.EXE) in Windows NT 4.0 allows remote attackers to cause a denial of service via a NULL policy handle in a call to (1) SamrOpenDomain, (2) SamrEnumDomainUsers, and (3) SamrQueryDomainInfo."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=94096671308565&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3293","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94096671308565&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3293","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0882","sourceIdentifier":"cve@mitre.org","published":"1999-10-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Falcon web server allows remote attackers to determine the absolute path of the web root via long file names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:falcon:falcon_web_server:1.0.0.1006:*:*:*:*:*:*:*","matchCriteriaId":"1662BFDE-D3B9-40E5-A128-916C7DB958A2"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0882","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0882","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0915","sourceIdentifier":"cve@mitre.org","published":"1999-10-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"URL Live! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pacific_software:url_live:1.0:*:*:*:*:*:*:*","matchCriteriaId":"76EAB542-B436-4DA9-853F-46B3C2E09A35"}]}]}],"references":[{"url":"http://www.osvdb.org/1129","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/746","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1129","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/746","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0950","sourceIdentifier":"cve@mitre.org","published":"1999-10-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in WFTPD FTP server allows remote attackers to gain root access via\ta series of MKD and CWD commands that create nested directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:texas_imperial_software:wftpd:2.34:*:*:*:*:*:*:*","matchCriteriaId":"2955B341-3B28-4474-96DD-AA11CD14E1A3"},{"vulnerable":true,"criteria":"cpe:2.3:a:texas_imperial_software:wftpd:2.40:*:*:*:*:*:*:*","matchCriteriaId":"B9B1592D-0D0E-4B03-9414-82AAD16B680E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/747","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/747","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1226","sourceIdentifier":"cve@mitre.org","published":"1999-10-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Communicator 4.7 and earlier allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long certificate key."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:N/A:P","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:*:*:*:*:*:*:*:*","versionEndIncluding":"4.7","matchCriteriaId":"5921E5E6-3D97-4075-B557-968340FB6E7B"}]}]}],"references":[{"url":"http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3436","source":"cve@mitre.org"},{"url":"http://www.securiteam.com/exploits/Netscape_4_7_and_earlier_vulnerable_to__Huge_Key__DoS.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3436","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1532","sourceIdentifier":"cve@mitre.org","published":"1999-10-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Messaging Server 3.54, 3.55, and 3.6 allows a remote attacker to cause a denial of service (memory exhaustion) via a series of long RCPT TO commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:messaging_server:3.6:*:*:*:*:*:*:*","matchCriteriaId":"B3EE4492-651C-4B65-B905-31D7E8E30E91"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:messaging_server:3.54:*:*:*:*:*:*:*","matchCriteriaId":"11AA27C0-D579-49E6-8479-D5DFFAC96D4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:messaging_server:3.55:*:*:*:*:*:*:*","matchCriteriaId":"26CE0F92-0E43-454D-B996-428FD8A72E11"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94117465014255&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/748","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94117465014255&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/748","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0873","sourceIdentifier":"cve@mitre.org","published":"1999-10-30T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Skyfull mail server via MAIL FROM command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sky_communications:skyfull:1.1.4:*:*:*:*:*:*:*","matchCriteriaId":"411F86A9-93B5-4197-B2F9-72E6E0EFBC0B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/759","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/759","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1577","sourceIdentifier":"cve@mitre.org","published":"1999-10-31T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in HHOpen ActiveX control (hhopen.ocx) 1.0.0.1 for Internet Explorer 4.01 and 5 allows remote attackers to execute arbitrary commands via long arguments to the OpenHelp method."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/29795","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/669","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3314","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/29795","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/archive/1/28719","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/669","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3314","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0354","sourceIdentifier":"cve@mitre.org","published":"1999-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.x or 5.x with Word 97 allows arbitrary execution of Visual Basic programs to the IE client through the Word 97 template, which doesn't warn the user that the template contains executable content.  Also applies to Outlook when the client views a malicious email message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:97:*:*:*:*:*:*:*","matchCriteriaId":"645B78F8-9AD7-4707-9CAD-5DC79475D971"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-002","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-002","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0827","sourceIdentifier":"cve@mitre.org","published":"1999-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"By default, Internet Explorer 5.0 and other versions enables the \"Navigate sub-frames across different domains\" option, which allows frame spoofing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0:a_mac_os:*:*:*:*:*:*","matchCriteriaId":"35AA9DC0-0694-48FC-8652-831DFAB29226"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBF9241-A175-438C-A793-3D245BE2AE35"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"943D5C5C-FC49-4EDE-AE75-A79CFF42208E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.1:*:*:*:*:*:*:*","matchCriteriaId":"59EB6841-0427-479B-8771-06DF62EE3C87"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.2:*:*:*:*:*:*:*","matchCriteriaId":"8873A08F-D4C7-46FC-8FE5-972644F85ADA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp2:*:*:*:*:*:*","matchCriteriaId":"C375A9AA-505B-444C-A45F-2BAAD0B2CD0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*","matchCriteriaId":"44FF4E47-AD75-42C7-BB84-42BBA46A58B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.5:*:*:*:*:*:*:*","matchCriteriaId":"1B26CE22-E730-4247-853E-5E640DB3ECB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:*:*:*:*:*:*:*:*","versionEndIncluding":"4.5","matchCriteriaId":"1D09FC21-1170-4399-8378-1D8353689C76"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0827","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0827","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0829","sourceIdentifier":"cve@mitre.org","published":"1999-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP Secure Web Console uses weak encryption."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:secure_web_console:*:*:*:*:*:*:*:*","matchCriteriaId":"BF216916-7C21-44B8-9895-CF8628E3627E"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0829","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0829","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0830","sourceIdentifier":"cve@mitre.org","published":"1999-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SCO UnixWare Xsco command via a long argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0830","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0830","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0854","sourceIdentifier":"cve@mitre.org","published":"1999-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ultimate Bulletin Board stores data files in the cgi-bin directory, allowing remote attackers to view the data if an error occurs when the HTTP server attempts to execute the file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:infopop:ultimate_bulletin_board:5.07:*:*:*:*:*:*:*","matchCriteriaId":"0C52CA83-3B52-4C87-92B1-E45424A2556B"}]}]}],"references":[{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-22&msg=NDBBLKOPOLNKELHPDEFKIEPGCAAA.renzo.toma%40veronica.nl","source":"cve@mitre.org"},{"url":"http://www.ultimatebb.com/home/versions.shtml","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-22&msg=NDBBLKOPOLNKELHPDEFKIEPGCAAA.renzo.toma%40veronica.nl","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ultimatebb.com/home/versions.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]}]}},{"cve":{"id":"CVE-1999-1077","sourceIdentifier":"cve@mitre.org","published":"1999-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Idle locking function in MacOS 9 allows local attackers to bypass the password protection of idled sessions via the programmer's switch or CMD-PWR keyboard sequence, which brings up a debugger that the attacker can use to disable the lock."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:9:*:*:*:*:*:*:*","matchCriteriaId":"9D22617D-622E-442B-A2C7-C2571978DC42"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94149318124548&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/756","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94149318124548&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/756","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1517","sourceIdentifier":"cve@mitre.org","published":"1999-11-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"runtar in the Amanda backup system used in various UNIX operating systems executes tar with root privileges, which allows a user to overwrite or read arbitrary files by providing the target files to runtar."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94148942818975&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/750","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94148942818975&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/750","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0946","sourceIdentifier":"cve@mitre.org","published":"1999-11-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Yamaha MidiPlug via a Text variable in an EMBED tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:yamaha:midiplug:1.1bj:*:*:*:*:*:*:*","matchCriteriaId":"50DEFAD6-56E1-4AD6-A0C6-2D38AA420B6E"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94157187815629&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/760","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94157187815629&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/760","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0947","sourceIdentifier":"cve@mitre.org","published":"1999-11-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AN-HTTPd provides example CGI scripts test.bat, input.bat, input2.bat, and envout.bat, which allow remote attackers to execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:an:an-httpd:1.2b:*:*:*:*:*:*:*","matchCriteriaId":"CAD1527A-4BE5-47BA-9FA9-C19DE1718E28"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94157187815629&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/762","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94157187815629&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/762","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0948","sourceIdentifier":"cve@mitre.org","published":"1999-11-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in uum program for Canna input system allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/757","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/757","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0949","sourceIdentifier":"cve@mitre.org","published":"1999-11-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in canuum program for Canna input system allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/757","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/757","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1531","sourceIdentifier":"cve@mitre.org","published":"1999-11-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in IBM HomePagePrint 1.0.7 for Windows98J allows a malicious Web site to execute arbitrary code on a viewer's system via a long IMG_SRC HTML tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:homepageprint:1.0.7:*:*:*:*:*:*:*","matchCriteriaId":"65454C25-8A06-4991-A1E7-843A69EE1591"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94157187815629&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7767.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/763","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94157187815629&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7767.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/763","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0885","sourceIdentifier":"cve@mitre.org","published":"1999-11-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Alibaba web server allows remote attackers to execute commands via a pipe character in a malformed URL."},{"lang":"es","value":"El servidor web Alibaba permite a un atacante remoto ejecutar comandos mediante un caráctar de tubería (barra vertical) en una URL malformada."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:computer_software_manufaktur:alibaba:2.0:*:*:*:*:*:*:*","matchCriteriaId":"8DD3CBF4-B593-4C4A-8B9C-D005846B4090"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/770","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-11-01&msg=01BF261F.928821E0.kerb%40fnusa.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/770","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=1999-11-01&msg=01BF261F.928821E0.kerb%40fnusa.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0904","sourceIdentifier":"cve@mitre.org","published":"1999-11-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in BFTelnet allows remote attackers to cause a denial of service via a long username."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:byte_fusion:bftelnet:1.1:*:*:*:*:*:*:*","matchCriteriaId":"3C251D7F-09C0-4553-8266-1E989B1F28D0"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/771","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/771","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0843","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Cisco routers running NAT via a PORT command from an FTP client to a Telnet port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router:*:*:*:*:*:*:*:*","matchCriteriaId":"EF6E96F8-E95E-4F3A-8CAF-936327BA3E54"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0843","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0843","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0887","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTGate web interface server allows remote attackers to read files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:floosietek:ftgate:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5410FC34-6F34-40D2-8CB7-8271C7BC593D"}]}]}],"references":[{"url":"http://www.eeye.com/html/Research/Advisories/AD05261999.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1137","source":"cve@mitre.org"},{"url":"http://www.eeye.com/html/Research/Advisories/AD05261999.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1137","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0896","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in RealNetworks RealServer administration utility allows remote attackers to execute arbitrary commands via a long username and password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver_g2:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C3F22E7F-F4D8-4052-A8DF-BA717EDD94B4"}]}]}],"references":[{"url":"http://service.real.com/help/faq/servg260.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/767","source":"cve@mitre.org"},{"url":"http://service.real.com/help/faq/servg260.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/767","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0898","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Windows NT 4.0 print spooler allow remote attackers to gain privileges or cause a denial of service via a malformed spooler request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*","matchCriteriaId":"B9236480-6450-42E1-B1FF-F336488A683A"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243649","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/768","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-047","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243649","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/768","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-047","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0899","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows NT 4.0 print spooler allows a local user to execute arbitrary commands due to inappropriate permissions that allow the user to specify an alternate print provider."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*","matchCriteriaId":"B9236480-6450-42E1-B1FF-F336488A683A"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243649","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/769","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-047","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ243649","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/769","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-047","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1065","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Palm Pilot HotSync Manager 3.0.4 in Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long string to port 14238 while the manager is in network mode."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:palm_pilot:hotsync_manager:3.0.4:*:*:*:*:*:*:*","matchCriteriaId":"BDCD0288-1793-484B-9F45-98C2361BC897"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94175465525422&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94175465525422&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1340","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in faxalter in hylafax 4.0.2 allows local users to gain privileges via a long -m command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hylafax:hylafax:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"CC80A56E-941A-440F-9141-DDAFCB76462B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94173799532589&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/765","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94173799532589&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/765","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1509","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Etype Eserv 2.50 web server allows a remote attacker to read any file in the file system via a .. (dot dot) in a URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:etype:eserv:2.50:*:*:*:*:*:*:*","matchCriteriaId":"641A86B4-0348-4B14-B79F-E16A98459CA4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94183041514522&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94177470915423&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/773","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94183041514522&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94177470915423&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/773","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1571","sourceIdentifier":"cve@mitre.org","published":"1999-11-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in sar for SCO OpenServer 5.0.0 through 5.0.5 may allow local users to gain root privileges via a long -f parameter, a different vulnerability than CVE-1999-1570."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"B3D78B5D-DE20-431B-859D-81E5751EA633"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"B8BA72B4-C4AF-41C6-92ED-30B286E00EF5"}]}]}],"references":[{"url":"ftp://stage.caldera.com/pub/security/sse/security_bulletins/SB-99.17c","source":"cve@mitre.org"},{"url":"ftp://stage.caldera.com/pub/security/sse/sse037c/sse037c.ltr","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93762097815861&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94053017801639&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94183363719024&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=vuln-dev&m=102098949103708&w=2","source":"cve@mitre.org"},{"url":"http://online.securityfocus.com/advisories/1843","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://online.securityfocus.com/archive/1/27074","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/8989.php","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/643","source":"cve@mitre.org"},{"url":"ftp://stage.caldera.com/pub/security/sse/security_bulletins/SB-99.17c","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://stage.caldera.com/pub/security/sse/sse037c/sse037c.ltr","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93762097815861&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94053017801639&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94183363719024&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=vuln-dev&m=102098949103708&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://online.securityfocus.com/advisories/1843","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://online.securityfocus.com/archive/1/27074","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/8989.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/643","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1529","sourceIdentifier":"cve@mitre.org","published":"1999-11-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow exists in the HELO command in Trend Micro Interscan VirusWall SMTP gateway 3.23/3.3 for NT, which may allow an attacker to execute arbitrary code."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.3:*:*:*:*:*:*:*","matchCriteriaId":"7A9D4E2E-889B-4233-8887-9CF00A5023A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.23:*:*:*:*:*:*:*","matchCriteriaId":"CEB4744D-EE43-4C45-AFA1-31AF57F4DEDC"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94201512111092&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94204166130782&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94210427406568&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94199707625818&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94208143007829&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/55551","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/787","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3465","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94201512111092&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94204166130782&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94210427406568&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94199707625818&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94208143007829&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/55551","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/787","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3465","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1533","sourceIdentifier":"cve@mitre.org","published":"1999-11-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Eicon Technology Diva LAN ISDN modem allows a remote attacker to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"D948171A-3B54-462A-8B2E-2C0266A37E94"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.3:*:*:*:*:*:*:*","matchCriteriaId":"7A9D4E2E-889B-4233-8887-9CF00A5023A7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93846522511387&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/665","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3317","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93846522511387&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/665","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3317","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0821","sourceIdentifier":"cve@mitre.org","published":"1999-11-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD seyon allows local users to gain privileges by providing a malicious program in the -emulator argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/838","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/838","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0863","sourceIdentifier":"cve@mitre.org","published":"1999-11-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD seyon via HOME environmental variable, -emulator argument, -modems argument, or the GUI."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0863","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0863","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1530","sourceIdentifier":"cve@mitre.org","published":"1999-11-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"cgiwrap as used on Cobalt RaQ 2.0 and RaQ 3i does not properly identify the user for running certain scripts, which allows a malicious site administrator to view or modify data located at another virtual site on the same system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*","matchCriteriaId":"0C1E1872-D16C-4848-800C-32B80DD59494"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94209954200450&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94225629200045&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7764.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/35","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/777","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94209954200450&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94225629200045&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7764.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/35","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/777","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1550","sourceIdentifier":"cve@mitre.org","published":"1999-11-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"bigconf.conf in F5 BIG/ip 2.1.2 and earlier allows remote attackers to read arbitrary files by specifying the target file in the \"file\" parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:f5:tmos:2.0:*:*:*:*:*:*:*","matchCriteriaId":"119C2CB6-23C5-40B2-805C-E48B4A7FDBF1"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94217006208374&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94217879020184&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94225879703021&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7771.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/778","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94217006208374&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94217879020184&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94225879703021&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7771.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/778","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2001-0679","sourceIdentifier":"cve@mitre.org","published":"1999-11-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A buffer overflow in InterScan VirusWall 3.23 and 3.3 allows a remote attacker to execute arbitrary code by sending a long HELO command to the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.3:*:*:*:*:*:*:*","matchCriteriaId":"7A9D4E2E-889B-4233-8887-9CF00A5023A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.23:*:*:*:*:*:*:*","matchCriteriaId":"CEB4744D-EE43-4C45-AFA1-31AF57F4DEDC"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94204166130782&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94208143007829&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94216491202063&w=2","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9911&L=NTBUGTRAQ&P=R2331","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3465","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94204166130782&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94208143007829&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94216491202063&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9911&L=NTBUGTRAQ&P=R2331","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3465","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0832","sourceIdentifier":"cve@mitre.org","published":"1999-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in NFS server on Linux allows attackers to execute commands via a long pathname."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-033.0.txt","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/1999/19991111","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_29.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh42-errata-general.html#NFS","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/782","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.20.9911091058140.12964-100000%40mail.zigzag.pl","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-033.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/1999/19991111","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_29.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh42-errata-general.html#NFS","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/782","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.20.9911091058140.12964-100000%40mail.zigzag.pl","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0983","sourceIdentifier":"cve@mitre.org","published":"1999-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Whois Internic Lookup program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:internic:whois_lookup:1.0:*:*:*:*:*:*:*","matchCriteriaId":"F3A0ABD0-E326-4584-AF8F-FC2157AD0731"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0983","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0983","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0984","sourceIdentifier":"cve@mitre.org","published":"1999-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Matt's Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matts_whois:matts_whois:1.0:*:*:*:*:*:*:*","matchCriteriaId":"3D692BAA-35DA-463C-8923-B139912EDF3B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0984","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0984","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0985","sourceIdentifier":"cve@mitre.org","published":"1999-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CC Whois program whois.cgi allows remote attackers to execute commands via shell metacharacters in the domain entry."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cc:cc_whois:1.0:*:*:*:*:*:*:*","matchCriteriaId":"1A81CD86-8B5B-4BEA-9D1D-786C4BFB7733"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0985","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0985","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1111","sourceIdentifier":"cve@mitre.org","published":"1999-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in StackGuard before 1.21 allows remote attackers to bypass the Random and Terminator Canary security mechanisms by using a non-linear attack which directly modifies a pointer to a return address instead of using a buffer overflow to reach the return address entry itself."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:immunix:stackguard:*:*:*:*:*:*:*:*","versionEndIncluding":"1.21","matchCriteriaId":"CE4FF4A5-0F12-458F-8635-7C93DCCC3870"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94218618329838&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/786","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3524","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94218618329838&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/786","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3524","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1112","sourceIdentifier":"cve@mitre.org","published":"1999-11-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in IrfanView32 3.07 and earlier allows attackers to execute arbitrary commands via a long string after the \"8BPS\" image type in a Photo Shop image header."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:irfanview:irfanview:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0.7","matchCriteriaId":"3CAEFA7F-A24E-41F6-85F1-6D080D38C781"}]}]}],"references":[{"url":"http://stud4.tuwien.ac.at/~e9227474/main2.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/34066","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/781","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3549","source":"cve@mitre.org"},{"url":"http://stud4.tuwien.ac.at/~e9227474/main2.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/34066","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/781","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3549","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0833","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in BIND 8.2 via NXT records."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*","matchCriteriaId":"52D1DAE0-DB4D-475F-B11B-29AA3A00DB60"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"93BB48F5-A635-402E-AE7F-B8AB90ED0C70"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/788","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/788","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0835","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in BIND named via malformed SIG records."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5:*:*:*:*:*:*:*","matchCriteriaId":"4EDA6C83-76C9-44F1-94A2-1CBCC7DBBB00"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2:*:*:*:*:*:*:*","matchCriteriaId":"B8352832-11AE-4BE4-B996-AA90E755066B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7:*:*:*:*:*:*:*","matchCriteriaId":"710007F4-EF8B-4DCC-89E9-54A13DF9B153"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/788","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/788","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0837","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in BIND by improperly closing TCP sessions via so_linger."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*","matchCriteriaId":"52D1DAE0-DB4D-475F-B11B-29AA3A00DB60"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"93BB48F5-A635-402E-AE7F-B8AB90ED0C70"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/788","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/788","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0848","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in BIND named via consuming more than \"fdmax\" file descriptors."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*","matchCriteriaId":"52D1DAE0-DB4D-475F-B11B-29AA3A00DB60"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"93BB48F5-A635-402E-AE7F-B8AB90ED0C70"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/788","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/788","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0849","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in BIND named via maxdname."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*","matchCriteriaId":"AB7F1274-7E0E-40C8-8006-ACFDBE757D35"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9.5:p1:*:*:*:*:*:*","matchCriteriaId":"F96CB4CD-5044-4A08-A6BE-1201C4141851"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*","matchCriteriaId":"8257C916-6F4D-4B7E-8EED-B2789B3B35AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:4.9.7:*:*:*:*:*:*:*","matchCriteriaId":"B959A2AB-703C-4354-8E23-809D2D13EC06"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*","matchCriteriaId":"BB79EDA4-9B2C-4C4C-A5DE-CB8C6EB00BDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*","matchCriteriaId":"4DF8869C-2446-48F3-A1CD-70AE44D74EF3"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*","matchCriteriaId":"52D1DAE0-DB4D-475F-B11B-29AA3A00DB60"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2:p1:*:*:*:*:*:*","matchCriteriaId":"CEBD7B33-5B16-4235-8792-69E09CFB0C4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"93BB48F5-A635-402E-AE7F-B8AB90ED0C70"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/788","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/788","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0851","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in BIND named via naptr."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5:*:*:*:*:*:*:*","matchCriteriaId":"4EDA6C83-76C9-44F1-94A2-1CBCC7DBBB00"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2:*:*:*:*:*:*:*","matchCriteriaId":"B8352832-11AE-4BE4-B996-AA90E755066B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7:*:*:*:*:*:*:*","matchCriteriaId":"710007F4-EF8B-4DCC-89E9-54A13DF9B153"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/788","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-034.1.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/194","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/788","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1511","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Xtramail 1.11 allow attackers to cause a denial of service (crash) and possibly execute arbitrary commands via (1) a long PASS command in the POP3 service, (2) a long HELO command in the SMTP service, or (3) a long user name in the Control Service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:artisoft:xtramail:1.11:*:*:*:*:*:*:*","matchCriteriaId":"A30E10F1-7C33-4468-8E32-5B88C38EF3E3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94226003804744&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/791","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3488","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94226003804744&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/791","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3488","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1539","sourceIdentifier":"cve@mitre.org","published":"1999-11-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FTP server in QPC Software's QVT/Term Plus versions 4.2d and 4.3 and QVT/Net 4.3 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long (1) user name or (2) password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qpc_software:qvt_net:4.3:*:*:*:*:*:*:*","matchCriteriaId":"EB558CF0-B311-43DF-8ADC-86682B9F8277"},{"vulnerable":true,"criteria":"cpe:2.3:a:qpc_software:qvt_term_plus:4.2d:*:*:*:*:*:*:*","matchCriteriaId":"EBA448CF-183F-4D57-AE64-923DBFFE19AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:qpc_software:qvt_term_plus:4.3:*:*:*:*:*:*:*","matchCriteriaId":"F6164706-6261-40C1-884D-1C5193069078"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94225924803704&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94223972910670&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/796","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3491","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94225924803704&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94223972910670&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/796","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3491","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0329","sourceIdentifier":"cve@mitre.org","published":"1999-11-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Microsoft ActiveX control allows a remote attacker to execute a malicious cabinet file via an attachment and an embedded script in an HTML mail, aka the \"Active Setup Control\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0:*:windows_98:*:*:*:*:*","matchCriteriaId":"D0BDA2A8-EBB9-47AB-9DA0-5C24527F7210"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0:*:windows_nt:*:*:*:*:*","matchCriteriaId":"077B638C-F14D-4048-86C8-B62517C5182F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0.1:*:windows_95:*:*:*:*:*","matchCriteriaId":"5680FE7F-95EE-46B2-B930-4A3DC27FD1A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0.1:*:windows_98:*:*:*:*:*","matchCriteriaId":"ACC3A8B3-4E8C-46BD-965C-4EF655B9018D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0.1:*:windows_nt:*:*:*:*:*","matchCriteriaId":"F7739338-DAE1-403F-B22C-2CFAC884E09A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.1:*:windows_95:*:*:*:*:*","matchCriteriaId":"D45C47A8-8B5F-4A49-8B36-FCBA09029375"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.1:*:windows_98:*:*:*:*:*","matchCriteriaId":"0CFF1B46-BEDD-4D96-90EA-EE4376AFCAF8"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.1:*:windows_nt_4.0:*:*:*:*:*","matchCriteriaId":"84730D4D-7887-4A64-8C76-F50C85309FE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5:*:windows_nt_4.0:*:*:*:*:*","matchCriteriaId":"7AAA310C-7DED-40B3-B5EF-80C7407BB01A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_2000:*:*:*:*:*","matchCriteriaId":"A7B6FB02-F15F-486D-8E7C-40830ABDB62F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_95:*:*:*:*:*","matchCriteriaId":"0CE25503-0EDA-4AFA-A4B8-36396BB4A4E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_98:*:*:*:*:*","matchCriteriaId":"376DA3A6-FAB8-4B18-B9D9-C176675C7671"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*","matchCriteriaId":"52970A43-173E-477B-80BF-6FDBB6B0EECD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*","matchCriteriaId":"D52F17AB-2C87-4C1A-91B5-267ABBCF5844"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.27.3110.1:*:*:*:*:*:*:*","matchCriteriaId":"6BAE90D0-1637-49F4-8453-5E9959B55002"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.72.2106.4:*:*:*:*:*:*:*","matchCriteriaId":"D707B4FB-4BB2-4C84-851B-A8926AC26B7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.72.3120.0:*:*:*:*:*:*:*","matchCriteriaId":"7769EE2E-A740-4AE8-B1B1-A5256C12601D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.72.3612.1700:*:*:*:*:*:*:*","matchCriteriaId":"14B52779-4A43-4507-988F-5B5A81658FF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*","matchCriteriaId":"1F71D6D7-6CB2-4BE9-839A-A5714144029C"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-048","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-048","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1050","sourceIdentifier":"cve@mitre.org","published":"1999-11-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Matt Wright FormHandler.cgi script allows remote attackers to read arbitrary files via (1) a .. (dot dot) in the reply_message_attach attachment parameter, or (2) by specifying the filename as a template."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formhandler.cgi:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4E4B14ED-6423-487E-9185-6000CC906506"},{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formhandler.cgi:2.0:*:*:*:*:*:*:*","matchCriteriaId":"CDA6F66D-C578-46B9-BECB-13971A87F9FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formhandler.cgi:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4B5C3D76-85DA-45BF-9397-4C7DD6186BF7"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/34600","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/34939","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/798","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/799","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3550","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/34600","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/34939","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/798","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/799","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3550","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0330","sourceIdentifier":"cve@mitre.org","published":"1999-11-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The networking software in Windows 95 and Windows 98 allows remote attackers to execute commands via a long file name string, aka the \"File Access URL\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-049","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-049","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0165","sourceIdentifier":"cve@mitre.org","published":"1999-11-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Delegate application proxy has several buffer overflows which allow a remote attacker to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:etl:delegate:5.9:*:*:*:*:*:*:*","matchCriteriaId":"F6584618-DFEC-416F-8335-7106EA25BE94"},{"vulnerable":true,"criteria":"cpe:2.3:a:etl:delegate:6.0:*:*:*:*:*:*:*","matchCriteriaId":"18763780-3419-4EFE-ABC7-0BE51CC90881"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/k-023.shtml","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=Pine.BSF.4.21.0002192249290.10784-100000%40freefall.freebsd.org","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4195","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/k-023.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=Pine.BSF.4.21.0002192249290.10784-100000%40freefall.freebsd.org","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4195","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1110","sourceIdentifier":"cve@mitre.org","published":"1999-11-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows Media Player ActiveX object as used in Internet Explorer 5.0 returns a specific error code when a file does not exist, which allows remote malicious web sites to determine the existence of files on the client."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/34675","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/793","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/34675","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/793","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1528","sourceIdentifier":"cve@mitre.org","published":"1999-11-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ProSoft Netware Client 5.12 on Macintosh MacOS 9 does not automatically log a user out of the NDS tree when the user logs off the system, which allows other users of the same system access to the unprotected NDS session."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:prosoft_engineering:netware_client:5.12:*:*:*:*:*:*:*","matchCriteriaId":"111AD397-9CF0-4B1E-9805-1C5FA85B6A54"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94261444428430&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/794","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94261444428430&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/794","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1190","sourceIdentifier":"cve@mitre.org","published":"1999-11-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in POP3 server of Admiral Systems EmailClub 1.05 allows remote attackers to execute arbitrary commands via a long \"From\" header in an e-mail message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:admiral_systems:emailclub:1.0.0.5:*:*:*:*:*:*:*","matchCriteriaId":"68D6A7F0-1132-4BEC-9950-4C6BEA8CA4C1"}]}]}],"references":[{"url":"http://www.securiteam.com/exploits/E-MailClub__FROM__remote_buffer_overflow.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/801","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securiteam.com/exploits/E-MailClub__FROM__remote_buffer_overflow.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/801","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1051","sourceIdentifier":"cve@mitre.org","published":"1999-11-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Default configuration in Matt Wright FormHandler.cgi script allows arbitrary directories to be used for attachments, and only restricts access to the /etc/ directory, which allows remote attackers to read arbitrary files via the reply_message_attach attachment parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formhandler.cgi:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4E4B14ED-6423-487E-9185-6000CC906506"},{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formhandler.cgi:2.0:*:*:*:*:*:*:*","matchCriteriaId":"CDA6F66D-C578-46B9-BECB-13971A87F9FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formhandler.cgi:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4B5C3D76-85DA-45BF-9397-4C7DD6186BF7"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/34939","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/34939","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1457","sourceIdentifier":"cve@mitre.org","published":"1999-11-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in thttpd HTTP server before 2.04-31 allows remote attackers to execute arbitrary commands via a long date string, which is not properly handled by the tdate_parse function."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:thttpd:thttpd_http_server:*:*:*:*:*:*:*:*","versionEndIncluding":"2.04","matchCriteriaId":"60CA9476-1B47-41CA-953C-9119BD6165CD"},{"vulnerable":true,"criteria":"cpe:2.3:a:thttpd:thttpd_http_server:*:*:*:*:*:*:*:*","versionEndIncluding":"2.04.31","matchCriteriaId":"9227A693-2643-4477-93C7-4688E5E6DA4F"},{"vulnerable":true,"criteria":"cpe:2.3:a:thttpd:thttpd_http_server:1.90a:*:*:*:*:*:*:*","matchCriteriaId":"7B360C87-05B2-43E4-B944-EAE5E5185080"}]}]}],"references":[{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_30.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_30.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1508","sourceIdentifier":"cve@mitre.org","published":"1999-11-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Web server in Tektronix PhaserLink Printer 840.0 and earlier allows a remote attacker to gain administrator access by directly calling undocumented URLs such as ncl_items.html and ncl_subjects.html."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:tek:phaser_network_printer_740:*:*:*:*:*:*:*:*","matchCriteriaId":"92CD72BA-2587-4A2E-A093-A8312400B747"},{"vulnerable":true,"criteria":"cpe:2.3:h:tek:phaser_network_printer_750:*:*:*:*:*:*:*:*","matchCriteriaId":"330E2C4E-17A7-425A-ABE0-2B31FA023223"},{"vulnerable":true,"criteria":"cpe:2.3:h:tek:phaser_network_printer_750dp:*:*:*:*:*:*:*:*","matchCriteriaId":"EE99F094-977A-4B57-A04D-7A710D708390"},{"vulnerable":true,"criteria":"cpe:2.3:h:tek:phaser_network_printer_840:*:*:*:*:*:*:*:*","matchCriteriaId":"A1442E6F-2231-4511-B94D-7FFA5B35FADF"},{"vulnerable":true,"criteria":"cpe:2.3:h:tek:phaser_network_printer_930:*:*:*:*:*:*:*:*","matchCriteriaId":"A91B124E-241C-481B-88D7-9ACB8EC0A956"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94286041430870&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/806","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94286041430870&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/806","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1549","sourceIdentifier":"cve@mitre.org","published":"1999-11-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lynx 2.x does not properly distinguish between internal and external HTML, which may allow a local attacker to read a \"secure\" hidden form value from a temporary file and craft a LYNXOPTIONS: URL that causes Lynx to modify the user's configuration file and execute commands."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","baseScore":7.8,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-346"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lynx_project:lynx:2.7:*:*:*:*:*:*:*","matchCriteriaId":"5F143511-3727-4D4A-89A3-226AC46394E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:lynx_project:lynx:2.8:*:*:*:*:*:*:*","matchCriteriaId":"D629A2AF-397E-4893-BE86-D396EE88482A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94286509804526&w=2","source":"cve@mitre.org","tags":["Exploit","Mailing List"]},{"url":"http://www.securityfocus.com/bid/804","source":"cve@mitre.org","tags":["Broken Link","Exploit","Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94286509804526&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List"]},{"url":"http://www.securityfocus.com/bid/804","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Exploit","Third Party Advisory","VDB Entry","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0793","sourceIdentifier":"cve@mitre.org","published":"1999-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer allows remote attackers to read files by redirecting data to a Javascript applet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-043","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-043","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1092","sourceIdentifier":"cve@mitre.org","published":"1999-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"tin 1.40 creates the .tin directory with insecure permissions, which allows local users to read passwords from the .inputhistory file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:iain_lea:tin:1.40:*:*:*:*:*:*:*","matchCriteriaId":"733B9371-E0B2-4DC3-B216-CC160099F8A2"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94286179032648&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94286179032648&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1519","sourceIdentifier":"cve@mitre.org","published":"1999-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Gene6 G6 FTP Server 2.0 allows a remote attacker to cause a denial of service (resource exhaustion) via a long (1) user name or (2) password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gene6:g6_ftp_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F2A93EE9-255E-499A-ABED-E9E94409AB39"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94286244700573&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/805","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3513","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94286244700573&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/805","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3513","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0073","sourceIdentifier":"cve@mitre.org","published":"1999-11-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Microsoft Rich Text Format (RTF) reader allows attackers to cause a denial of service via a malformed control word."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249973","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/search.php3?type=2&pattern=win-malformed-rtf-control-word","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-005","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249973","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/search.php3?type=2&pattern=win-malformed-rtf-control-word","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-005","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0987","sourceIdentifier":"cve@mitre.org","published":"1999-11-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT does not properly download a system policy if the domain user logs into the domain with a space at the end of the domain name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-287"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237923","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ237923","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0352","sourceIdentifier":"cve@mitre.org","published":"1999-11-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Pine before version 4.21 does not properly filter shell metacharacters from URLs, which allows remote attackers to execute arbitrary commands via a malformed URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:4.20:*:*:*:*:*:*:*","matchCriteriaId":"16766308-A2F2-4155-A4F7-702808CC9450"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:pine:4.21:*:*:*:*:*:*:*","matchCriteriaId":"AA9E599F-D922-42B7-9FB5-FB025B095895"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-036.0.txt","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_36.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/810","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9911171818220.12375-100000%40ray.compu-aid.com","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-1999-036.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_36.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/810","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.9911171818220.12375-100000%40ray.compu-aid.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0831","sourceIdentifier":"cve@mitre.org","published":"1999-11-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Linux syslogd via a large number of connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cobalt:qube:1.0:*:*:*:*:*:*:*","matchCriteriaId":"23830C81-FC80-4BD5-87D4-B83769D90BB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:cobalt:qube:2.0:*:*:*:*:*:*:*","matchCriteriaId":"AC4E81A9-E7A8-415B-BFDD-6F819D2B5733"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:cobalt_raq:1.1:*:*:*:*:*:*:*","matchCriteriaId":"4EE83B2E-D502-41EE-B1CC-D7A3FD408D1A"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*","matchCriteriaId":"0C1E1872-D16C-4848-800C-32B80DD59494"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*","matchCriteriaId":"0AD0FF64-05DF-48C2-9BB5-FD993121FB2E"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-035.0.txt","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/809","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-1999-035.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/809","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0999","sourceIdentifier":"cve@mitre.org","published":"1999-11-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft SQL 7.0 server allows a remote attacker to cause a denial of service via a malformed TDS packet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:P","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*","matchCriteriaId":"A2AB95D7-394E-423B-884C-87A9960682EE"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248749","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/817","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-059","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248749","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/817","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-059","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1475","sourceIdentifier":"cve@mitre.org","published":"1999-11-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ProFTPd 1.2 compiled with the mod_sqlpw module records user passwords in the wtmp log file, which allows local users to obtain the passwords and gain privileges by reading wtmp, e.g. via the last command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:proftpd_project:proftpd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"CE2243B4-8E0C-46BC-A003-EF52C30A030E"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/35483","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/812","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/35483","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/812","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0818","sourceIdentifier":"cve@mitre.org","published":"1999-11-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris kcms_configure via a long NETPATH environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/831","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38433B7F5A.53F4SHADOWPENGUIN%40fox.nightland.net","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/831","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38433B7F5A.53F4SHADOWPENGUIN%40fox.nightland.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1058","sourceIdentifier":"cve@mitre.org","published":"1999-11-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Vermillion FTP Daemon VFTPD 1.23 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via several long CWD commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:arcane_software:vermillion_ftp_daemon:1.23:*:*:*:*:*:*:*","matchCriteriaId":"EEB7F46E-9949-43F3-8B7C-912D17AD7E39"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94329968617085&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94337185023159&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/818","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3543","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94329968617085&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94337185023159&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/818","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3543","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1527","sourceIdentifier":"cve@mitre.org","published":"1999-11-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internal HTTP server in Sun Netbeans Java IDE in Netbeans Developer 3.0 Beta and Forte Community Edition 1.0 Beta does not properly restrict access to IP addresses as specified in its configuration, which allows arbitrary remote attackers to access the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:forte:community_1.0_beta:*:*:*:*:*:*:*","matchCriteriaId":"B7DF8E6B-3963-48BF-9384-B8F6F34FA4BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:netbeans_developer:3.0_beta:*:*:*:*:*:*:*","matchCriteriaId":"7C512F1D-D51D-4C44-B1BF-66801FCBD5EB"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94338883114254&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/816","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94338883114254&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/816","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0531","sourceIdentifier":"cve@mitre.org","published":"1999-11-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux gpm program allows local users to cause a denial of service by flooding the /dev/gpmctl device with STREAM sockets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.3:*:*:*:*:*:*:*","matchCriteriaId":"23B38FCC-2C86-4E84-860B-EBAE0FA123B6"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.4:*:*:*:*:*:*:*","matchCriteriaId":"A63714ED-A697-4AC3-AF13-3B028F9A87EF"},{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux_eserver:2.3:*:*:*:*:*:*:*","matchCriteriaId":"3BE526D3-4CD8-423C-81FA-65B92F862A5E"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0409.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-045.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1377","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10006201453090.1812-200000%40apollo.aci.com.pl","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5010","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0409.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-045.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1377","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10006201453090.1812-200000%40apollo.aci.com.pl","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5010","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0844","sourceIdentifier":"cve@mitre.org","published":"1999-11-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in MDaemon WorldClient and WebConfig services via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:deerfield:mdaemon:2.8.5:*:*:*:*:*:*:*","matchCriteriaId":"189DC153-488F-496B-A807-7E3F8AC815C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:deerfield:mdaemon:2.8.6:*:*:*:*:*:*:*","matchCriteriaId":"B7E862B7-F01C-44B5-A0F6-FF0C6DDD5C9F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/820","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/823","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/820","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/823","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1163","sourceIdentifier":"cve@mitre.org","published":"1999-11-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in HP Series 800 S/X/V Class servers allows remote attackers to gain access to the S/X/V Class console via the Service Support Processor (SSP) Teststation."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:hp:9000:800:*:*:*:*:*:*:*","matchCriteriaId":"487DFFD8-F648-4D8F-8919-FC600A5D828B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94347039929958&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7439.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94347039929958&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7439.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1189","sourceIdentifier":"cve@mitre.org","published":"1999-11-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Netscape Navigator/Communicator 4.7 for Windows 95 and Windows 98 allows remote attackers to cause a denial of service, and possibly execute arbitrary commands, via a long argument after the ? character in a URL that references an .asp, .cgi, .html, or .pl file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"38FD74F5-12ED-4049-B06F-0F22A0254C0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"F2AE46C7-6538-4DE6-B3EA-81AD7F7C43E2"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/36306","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/36608","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/822","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7884","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/36306","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/36608","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/822","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7884","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1548","sourceIdentifier":"cve@mitre.org","published":"1999-11-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cabletron SmartSwitch Router (SSR) 8000 firmware 2.x can only handle 200 ARP requests per second allowing a denial of service attack to succeed with a flood of ARP requests exceeding that limit."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cabletron:smartswitch_router_8000_firmware:2.0:*:*:*:*:*:*:*","matchCriteriaId":"7E9F9727-4F67-411E-8697-09B572D6EB64"}]}]}],"references":[{"url":"http://razor.bindview.com/publish/advisories/adv_Cabletron.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/821","source":"cve@mitre.org"},{"url":"http://razor.bindview.com/publish/advisories/adv_Cabletron.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/821","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0317","sourceIdentifier":"cve@mitre.org","published":"1999-11-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Linux su command gives root access to local users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*","matchCriteriaId":"1E3313D5-52E8-49B3-B145-170D9A26DA43"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0317","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0317","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0845","sourceIdentifier":"cve@mitre.org","published":"1999-11-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SCO su program allows local users to gain root access via a long username."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0845","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0845","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1547","sourceIdentifier":"cve@mitre.org","published":"1999-11-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Oracle Web Listener 2.1 allows remote attackers to bypass access restrictions by replacing a character in the URL with its HTTP-encoded (hex) equivalent."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:web_listener:2.1:*:*:*:*:*:*:*","matchCriteriaId":"21A69B8E-6681-40A2-B90C-C74E3E72C0C0"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94359982417686&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94390053530890&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/841","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94359982417686&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94390053530890&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/841","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0387","sourceIdentifier":"cve@mitre.org","published":"1999-11-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A legacy credential caching mechanism used in Windows 95 and Windows 98 systems allows attackers to read plaintext network passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:N/A:N","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-255"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ168115","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/829","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-052","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ168115","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/829","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-052","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0839","sourceIdentifier":"cve@mitre.org","published":"1999-11-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT Task Scheduler installed with Internet Explorer 5 allows a user to gain privileges by modifying the job after it has been scheduled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5:*:windows_nt_4.0:*:*:*:*:*","matchCriteriaId":"7AAA310C-7DED-40B3-B5EF-80C7407BB01A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_95:*:*:*:*:*","matchCriteriaId":"0CE25503-0EDA-4AFA-A4B8-36396BB4A4E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_98:*:*:*:*:*","matchCriteriaId":"376DA3A6-FAB8-4B18-B9D9-C176675C7671"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246972","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/828","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-051","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246972","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/828","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-051","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0842","sourceIdentifier":"cve@mitre.org","published":"1999-11-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Symantec Mail-Gear 1.0 web interface server allows remote users to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail-gear:1.0:*:*:*:*:*:*:*","matchCriteriaId":"1AE9B457-A2EF-4FA4-977D-895876B252B9"}]}]}],"references":[{"url":"http://www.osvdb.org/1144","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/827","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEAFCBAA.labs%40ussrback.com","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1144","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/827","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCEAFCBAA.labs%40ussrback.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0847","sourceIdentifier":"cve@mitre.org","published":"1999-11-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in free internet chess server (FICS) program, xboard."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:freechess.org:fics_program:*:*:*:*:*:*:*:*","matchCriteriaId":"B90FB68E-45CE-4DE6-B093-3E7F2F890F41"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=94407791819019&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=94407791819019&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0822","sourceIdentifier":"cve@mitre.org","published":"1999-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Qpopper (qpop) 3.0 allows remote root access via AUTH command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0:*:*:*:*:*:*:*","matchCriteriaId":"B1208414-D175-41E2-BCBC-9E5EDBC41FFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0b20:*:*:*:*:*:*:*","matchCriteriaId":"08E3D83E-2D0C-4E47-8D57-8EC18115BCB6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/830","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/830","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0824","sourceIdentifier":"cve@mitre.org","published":"1999-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT user can use SUBST to map a drive letter to a folder, which is not unmapped after the user logs off, potentially allowing that user to modify the location of folders accessed by later users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*","matchCriteriaId":"B9236480-6450-42E1-B1FF-F336488A683A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/833","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/833","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0840","sourceIdentifier":"cve@mitre.org","published":"1999-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CDE dtmail and dtmailpr programs allows local users to gain privileges via a long -f option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securiteam.com/exploits/3J5QQPPQ0O.html","source":"cve@mitre.org"},{"url":"http://www.security-express.com/archives/bugtraq/1999-q4/0122.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/832","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3579","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3580","source":"cve@mitre.org"},{"url":"http://www.securiteam.com/exploits/3J5QQPPQ0O.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.security-express.com/archives/bugtraq/1999-q4/0122.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/832","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3579","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3580","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0841","sourceIdentifier":"cve@mitre.org","published":"1999-11-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CDE mailtool allows local users to gain root privileges via a long MIME Content-Type."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securiteam.com/exploits/3J5QQPPQ0O.html","source":"cve@mitre.org"},{"url":"http://www.security-express.com/archives/bugtraq/1999-q4/0122.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/832","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3732","source":"cve@mitre.org"},{"url":"http://www.securiteam.com/exploits/3J5QQPPQ0O.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.security-express.com/archives/bugtraq/1999-q4/0122.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/832","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3732","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0819","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NTMail does not disable the VRFY command, even if the administrator has explicitly disabled it."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94398141118586&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94398141118586&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0820","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD seyon allows users to gain privileges via a modified PATH variable for finding the xterm and seyon-emu commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"http://www.osvdb.org/5996","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/838","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/5996","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/838","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0823","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD xmindpath allows local users to gain privileges via -f argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"http://www.osvdb.org/1150","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/839","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1150","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/839","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0826","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD angband allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"http://www.osvdb.org/1151","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/840","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1151","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/840","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0834","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in RSAREF2 via the encryption and decryption functions in the RSAREF library."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rsa:rsaref:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4FFB1571-51FF-44FD-9C6F-369BCAD402D9"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/843","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/843","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0838","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Serv-U FTP 2.5 allows remote users to conduct a denial of service via the SITE command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:deerfield:serv-u_ftp-server:2.5a:*:*:*:*:*:*:*","matchCriteriaId":"2F8FE4FC-4006-46B5-946F-BC54BA9F8CFA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/859","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/859","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0846","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in MDaemon 2.7 via a large number of connection attempts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:deerfield:mdaemon:2.8.5:*:*:*:*:*:*:*","matchCriteriaId":"189DC153-488F-496B-A807-7E3F8AC815C4"},{"vulnerable":true,"criteria":"cpe:2.3:a:deerfield:mdaemon:2.8.6:*:*:*:*:*:*:*","matchCriteriaId":"B7E862B7-F01C-44B5-A0F6-FF0C6DDD5C9F"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=94398020817351&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=94398020817351&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0853","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Netscape Enterprise Server and Netscape FastTrack Server allows remote attackers to gain privileges via the HTTP Basic Authentication procedure."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"4147A43C-DA7B-4D08-90E9-72DE57B1D61D"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*","matchCriteriaId":"3577B789-DBB6-413D-B964-B32FE3E8CD8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.6:sp2:*:*:*:*:*:*","matchCriteriaId":"4EB62E6F-87E2-4A98-B4BD-3E0036CE7640"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:fasttrack_server:3.01:*:*:*:*:*:*:*","matchCriteriaId":"63A12C94-E68C-48E2-B88E-571C4FD9099C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/847","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/847","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0855","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD gdc program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/834","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/834","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0856","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"login in Slackware 7.0 allows remote attackers to identify valid users on the system by reporting an encryption error when an account is locked or does not exist."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"C2A9C005-4392-4C95-9B92-98EEC73EFE73"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=94416739411280&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=94416739411280&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0857","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD gdc program allows local users to modify files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/835","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/835","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0859","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris arp allows local users to read files via the -f parameter, which lists lines in the file that do not parse properly."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.osvdb.org/6994","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/837","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6994","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/837","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0860","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris chkperm allows local users to read files owned by bin via the VMSYS environmental variable and a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/837","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/837","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0963","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FreeBSD mount_union command allows local users to gain root privileges via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"}]}]}],"references":[{"url":"http://www.osvdb.org/6088","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6088","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0004","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ZBServer Pro allows remote attackers to read source code for executable files by inserting a . (dot) into the URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zbsoft:zbserver:1.5:*:*:*:*:*:*:*","matchCriteriaId":"0A92DFC9-A26E-418B-B1BC-565B27C81795"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94606572912422&w=2","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9912&L=NTBUGTRAQ&P=R3556","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94606572912422&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9912&L=NTBUGTRAQ&P=R3556","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0021","sourceIdentifier":"cve@mitre.org","published":"1999-12-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lotus Domino HTTP server allows remote attackers to determine the real path of the server via a request to a non-existent script in /cgi-bin."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_server:4.6:*:*:*:*:*:*:*","matchCriteriaId":"D3174854-2CC6-42C5-BC53-F64DE247AF77"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/881","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/881","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0828","sourceIdentifier":"cve@mitre.org","published":"1999-12-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UnixWare pkg commands such as pkginfo, pkgcat, and pkgparam allow local users to read arbitrary files via the dacread permission."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/853","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/853","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0850","sourceIdentifier":"cve@mitre.org","published":"1999-12-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default permissions for Endymion MailMan allow local users to read email or modify files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:endymion:mailman_webmail:3.0.18:*:*:*:*:*:*:*","matchCriteriaId":"49824940-8621-4B21-B3D4-447D7A9C50D7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/845","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/845","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0852","sourceIdentifier":"cve@mitre.org","published":"1999-12-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM WebSphere sets permissions that allow a local user to modify a deinstallation script or its data files stored in /usr/bin."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:websphere_application_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"85D0DA05-D76A-4623-B7EC-07A9D06E6E9F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/844","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/844","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0858","sourceIdentifier":"cve@mitre.org","published":"1999-12-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5 allows a remote attacker to modify the IE client's proxy configuration via a malicious Web Proxy Auto-Discovery (WPAD) server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-16"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247333","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/846","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-054","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247333","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/846","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-054","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0862","sourceIdentifier":"cve@mitre.org","published":"1999-12-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Insecure directory permissions in RPM distribution for PostgreSQL allows local users to gain privileges by reading a plaintext password file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:postgresql:postgresql:6.3.2:*:*:*:*:*:*:*","matchCriteriaId":"FF7D1F6F-044C-478D-991D-D70281FD7C87"},{"vulnerable":true,"criteria":"cpe:2.3:a:postgresql:postgresql:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"6EB98484-1234-4BA2-ACB0-28F4BE684D92"},{"vulnerable":true,"criteria":"cpe:2.3:a:postgresql:postgresql:6.5.3.1:*:*:*:*:*:*:*","matchCriteriaId":"31C6D856-9046-4FF1-8A38-848535D57D22"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0862","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0862","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0366","sourceIdentifier":"cve@mitre.org","published":"1999-12-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"dump in Debian GNU/Linux 2.1 does not properly restore symlinks, which allows a local user to modify the ownership of arbitrary files."},{"lang":"es","value":"volcado en Debian GNU/Linux 2.1 no restarura adecuadamente los vínculos simbólicos (symlinks), lo que permite a un usuario local modificar la propiedad de ficheros arbitrariamente."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"}]}]}],"references":[{"url":"http://www.debian.org/security/1999/19991202","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1442","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/1999/19991202","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1442","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0825","sourceIdentifier":"cve@mitre.org","published":"1999-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default permissions for UnixWare /var/mail allow local users to read and modify other users' mail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/849","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/849","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0864","sourceIdentifier":"cve@mitre.org","published":"1999-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UnixWare programs that dump core allow a local user to modify files via a symlink attack on the ./core.pid file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94530783815434&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94581379905584&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94606167110764&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/851","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991203020720.13115.qmail%40nwcst289.netaddress.usa.net","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94530783815434&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94581379905584&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94606167110764&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/851","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=19991203020720.13115.qmail%40nwcst289.netaddress.usa.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0865","sourceIdentifier":"cve@mitre.org","published":"1999-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CommuniGatePro via a long string to the HTTP configuration port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stalker:communigate_pro:3.1:*:*:*:*:*:*:*","matchCriteriaId":"B99838A0-D980-4E0F-BFF3-9DEF998F78AB"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94426440413027&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94454565726775&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/860","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94426440413027&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94454565726775&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/860","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0866","sourceIdentifier":"cve@mitre.org","published":"1999-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in UnixWare xauto program allows local users to gain root privilege."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.24a","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94530783815434&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94581379905584&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94606167110764&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/848","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-99.24a","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94530783815434&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94581379905584&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94606167110764&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/848","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0139","sourceIdentifier":"cve@mitre.org","published":"1999-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Anywhere POP3 Mail Server allows local users to cause a denial of service via a malformed RETR command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:true_north:internet_anywhere_mail_server:3.1.3:*:*:*:*:*:*:*","matchCriteriaId":"346E073E-72EE-44C6-A24F-39474627F857"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95021326417936&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/982","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95021326417936&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/982","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0357","sourceIdentifier":"cve@mitre.org","published":"1999-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ORBit and esound in Red Hat Linux 6.1 do not use sufficiently random numbers, which allows local users to guess the authentication keys."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"}]}]}],"references":[{"url":"http://www.redhat.com/corp/support/errata/RHSA1999058-01.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/corp/support/errata/RHSA1999058-01.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0358","sourceIdentifier":"cve@mitre.org","published":"1999-12-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ORBit and gnome-session in Red Hat Linux 6.1 allows remote attackers to crash a program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"}]}]}],"references":[{"url":"http://www.redhat.com/corp/support/errata/RHSA1999058-01.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/corp/support/errata/RHSA1999058-01.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0988","sourceIdentifier":"cve@mitre.org","published":"1999-12-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UnixWare pkgtrans allows local users to read arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.0:*:*:*:*:*:*:*","matchCriteriaId":"43D2F319-DF69-4E52-AF29-06DF1E312030"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"B3AC5333-BC57-48EB-BB77-1E258791EFEE"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*","matchCriteriaId":"168248AC-E4F6-4C8F-9A21-0E6ABE029DFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.16:*:*:*:*:*:*:*","matchCriteriaId":"EB069CA5-F5F8-447D-997D-481E5158DABB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0988","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0988","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0982","sourceIdentifier":"cve@mitre.org","published":"1999-12-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Sun Web-Based Enterprise Management (WBEM) installation script stores a password in plaintext in a world readable file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:web-based_enterprise_management:1.0:*:*:*:*:*:*:*","matchCriteriaId":"D1BDFB6D-F48D-4AF0-A634-262D1954D426"},{"vulnerable":true,"criteria":"cpe:2.3:a:sun:web-based_enterprise_management:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D36D45B5-0A8A-4720-BA64-ABCF2C71E77C"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:8.0:beta:*:*:*:*:*:*","matchCriteriaId":"11847B60-D66B-4386-940A-C53B11853E50"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0982","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0982","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0990","sourceIdentifier":"cve@mitre.org","published":"1999-12-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Error messages generated by gdm with the VerboseAuth setting allows an attacker to identify valid users on a system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gdm:2.0_beta4:*:*:*:*:*:*:*","matchCriteriaId":"FA0A11C1-AF35-4006-A5BA-634B814DAC73"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0990","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0990","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0989","sourceIdentifier":"cve@mitre.org","published":"1999-12-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Internet Explorer 5 directshow filter (MSDXM.OCX) allows remote attackers to execute commands via the vnd.ms.radio protocol."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5:*:windows_nt_4.0:*:*:*:*:*","matchCriteriaId":"7AAA310C-7DED-40B3-B5EF-80C7407BB01A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_95:*:*:*:*:*","matchCriteriaId":"0CE25503-0EDA-4AFA-A4B8-36396BB4A4E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_98:*:*:*:*:*","matchCriteriaId":"376DA3A6-FAB8-4B18-B9D9-C176675C7671"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/861","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/861","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0991","sourceIdentifier":"cve@mitre.org","published":"1999-12-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in GoodTech Telnet Server NT allows remote users to cause a denial of service via a long login name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:goodtech:telnet_server_nt:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"97138DD7-9D7A-4B93-8D5F-D02BD4F1EB4F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/862","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/862","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0973","sourceIdentifier":"cve@mitre.org","published":"1999-12-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris snoop program allows remote attackers to gain root privileges via a long domain name when snoop is running in verbose mode."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/858","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/858","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0976","sourceIdentifier":"cve@mitre.org","published":"1999-12-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail allows local users to reinitialize the aliases database via the newaliases command, then cause a denial of service by interrupting Sendmail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.9.3:*:*:*:*:*:*:*","matchCriteriaId":"D4273E93-B536-4B2C-8DAD-84A6F5E38890"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/857","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/857","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0981","sourceIdentifier":"cve@mitre.org","published":"1999-12-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.01 and earlier allows a remote attacker to create a reference to a client window and use a server-side redirect to access local files via that window, aka \"Server-side Page Reference Redirect.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*","versionEndIncluding":"5.01","matchCriteriaId":"E451A785-9BAF-4F62-932A-A9D8ED86D40C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246094","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-050","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246094","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-050","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0986","sourceIdentifier":"cve@mitre.org","published":"1999-12-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ping command in Linux 2.0.3x allows local users to cause a denial of service by sending large packets with the -R (record route) option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*","matchCriteriaId":"96A6EE7E-C79C-4B25-AFF0-C6638CB3C99A"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.34:*:*:*:*:*:*:*","matchCriteriaId":"92555500-16EB-4F76-B2C7-61A00A1AC722"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.35:*:*:*:*:*:*:*","matchCriteriaId":"B03D22C9-94C6-4AC5-AAD0-15F06BCC5CA7"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.36:*:*:*:*:*:*:*","matchCriteriaId":"541B4ED8-E970-4C67-B5AF-7DE5B7F754D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.37:*:*:*:*:*:*:*","matchCriteriaId":"1E55F8A8-1ABD-4760-9074-353BBAEE005B"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.0.38:*:*:*:*:*:*:*","matchCriteriaId":"F873503F-C6E2-4AC2-859E-9431FE0FA0A3"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/870","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/870","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0972","sourceIdentifier":"cve@mitre.org","published":"1999-12-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Xshipwars xsw program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wolfpack_development:xshipwars:1.0:*:*:*:*:*:*:*","matchCriteriaId":"22B32300-4C56-4ECB-8438-2251FDBDE5B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:wolfpack_development:xshipwars:1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"BC96F3FA-02BE-4A34-B5BD-75CAEF3B7148"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/863","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/863","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0974","sourceIdentifier":"cve@mitre.org","published":"1999-12-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris snoop allows remote attackers to gain root privileges via GETQUOTA requests to the rpc.rquotad service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/190","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/864","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/190","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/864","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0978","sourceIdentifier":"cve@mitre.org","published":"1999-12-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"htdig allows remote attackers to execute commands via filenames with shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/867","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/867","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0975","sourceIdentifier":"cve@mitre.org","published":"1999-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows help system can allow a local user to execute commands as another user by editing a table of contents metafile with a .CNT extension and modifying the topic action to include the commands to be executed when the .hlp file is accessed."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/868","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/868","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0977","sourceIdentifier":"cve@mitre.org","published":"1999-12-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris sadmind allows remote attackers to gain root privileges using a NETMGT_PROC_SERVICE request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/191","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/2558","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/2354","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/866","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/191","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/2558","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/2354","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/866","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0289","sourceIdentifier":"cve@mitre.org","published":"1999-12-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Apache web server for Win32 may provide access to restricted files when a . (dot) is appended to a requested URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:-:*:*:*:*:*:*:*","matchCriteriaId":"D623D8C0-65D2-4269-A1D4-5CB3899F44C8"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:x86:*","matchCriteriaId":"60366048-32FE-4081-A852-04319FD7A52C"}]}]}],"references":[{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0289","source":"cve@mitre.org"},{"url":"https://www.cve.org/CVERecord?id=CVE-1999-0289","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1009","sourceIdentifier":"cve@mitre.org","published":"1999-12-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Disney Go Express Search allows remote attackers to access and modify search information for users by connecting to an HTTP server on the user's system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:disney:go_express_search:*:*:*:*:*:*:*:*","matchCriteriaId":"2B497A96-CEAF-4CBF-B929-23F0DF97DE54"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1009","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1009","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0993","sourceIdentifier":"cve@mitre.org","published":"1999-12-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Modifications to ACLs (Access Control Lists) in Microsoft Exchange  5.5 do not take effect until the directory store cache is refreshed."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-665"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.0:-:*:*:*:*:*:*","matchCriteriaId":"D823C88E-8560-469B-8655-4755E0484F14"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*","matchCriteriaId":"B4F9C143-4734-4E5D-9281-F51513C5CAAF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0993","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0993","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1003","sourceIdentifier":"cve@mitre.org","published":"1999-12-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"War FTP Daemon 1.70 allows remote attackers to cause a denial of service by flooding it with connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jgaa:warftpd:1.70:*:*:*:*:*:*:*","matchCriteriaId":"979D5A22-E5CD-4195-8FC3-BCEF829549B1"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1003","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1003","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1007","sourceIdentifier":"cve@mitre.org","published":"1999-12-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in VDO Live Player allows remote attackers to execute commands on the VDO client via a malformed .vdo file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vdonet:vdolive_player:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"7E856AE4-110C-4002-8D8F-34337B99A4FC"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94512259331599&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/872","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94512259331599&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/872","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1010","sourceIdentifier":"cve@mitre.org","published":"1999-12-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An SSH 1.2.27 server allows a client to use the \"none\" cipher, even if it is not allowed by the server policy."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"114134F3-BDFD-465D-8317-82F9D6EFA5A7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94519142415338&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94519142415338&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0068","sourceIdentifier":"cve@mitre.org","published":"1999-12-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"daynad program in Intel InBusiness E-mail Station does not require authentication, which allows remote attackers to modify its configuration, delete files, or read mail."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intel:inbusiness_email_station:*:*:*:*:*:*:*:*","versionEndIncluding":"1.04","matchCriteriaId":"C7E17127-358C-45D7-89B3-7A41401BEA07"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94704437920965&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94704437920965&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0361","sourceIdentifier":"cve@mitre.org","published":"1999-12-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The PPP wvdial.lxdialog script in wvdial 1.4 and earlier creates a .config file with world readable permissions, which allows a local attacker in the dialout group to access login and password information."},{"lang":"es","value":"El script para PPP wvdial.lxdialog en wvdial 1.4 crea un fichero .config legible por todos los usuarios, que permite a un atacante local del grupo de marcado externto acceder a información de usuarios y contraseñas."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:*:*:*:*:*:*:*:*","matchCriteriaId":"67527281-81FA-4068-9E0A-7B19FB6A208A"}]}]}],"references":[{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_35.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_35.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0934","sourceIdentifier":"cve@mitre.org","published":"1999-12-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"classifieds.cgi allows remote attackers to read arbitrary files via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://www.securityfocus.com/bid/2020","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3102","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/2020","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3102","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0935","sourceIdentifier":"cve@mitre.org","published":"1999-12-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"classifieds.cgi allows remote attackers to execute arbitrary commands by specifying them in a hidden variable in a CGI form."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0935","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0935","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0996","sourceIdentifier":"cve@mitre.org","published":"1999-12-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Infoseek Ultraseek search engine allows remote attackers to execute commands via a long GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:infoseek:ultraseek_server:3.1:*:*:*:*:*:*:*","matchCriteriaId":"3DD7E397-BD6B-419F-8835-63122B2D32F6"}]}]}],"references":[{"url":"http://www.eeye.com/html/Research/Advisories/AD19991215.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6490","source":"cve@mitre.org"},{"url":"http://www.eeye.com/html/Research/Advisories/AD19991215.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6490","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0994","sourceIdentifier":"cve@mitre.org","published":"1999-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT with SYSKEY reuses the keystream that is used for encrypting SAM password hashes, allowing an attacker to crack passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-255"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*","matchCriteriaId":"7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise:*:*:*:*:*","matchCriteriaId":"BBD9C514-5AF7-4849-A535-F0F3C9339051"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248183","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/873","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-056","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248183","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/873","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-056","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0995","sourceIdentifier":"cve@mitre.org","published":"1999-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT Local Security Authority (LSA) allows remote attackers to cause a denial of service via malformed arguments to the LsaLookupSids function which looks up the SID, aka \"Malformed Security Identifier Request.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*","matchCriteriaId":"7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise:*:*:*:*:*","matchCriteriaId":"BBD9C514-5AF7-4849-A535-F0F3C9339051"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248185","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/875","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-057","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248185","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/875","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-057","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0998","sourceIdentifier":"cve@mitre.org","published":"1999-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Cache Engine allows an attacker to replace content in the cache."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:cache_engine:2:*:*:*:*:*:*:*","matchCriteriaId":"B7D41695-13E0-45AD-A83F-5414BF1498CF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0998","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0998","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1000","sourceIdentifier":"cve@mitre.org","published":"1999-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:cache_engine:2:*:*:*:*:*:*:*","matchCriteriaId":"B7D41695-13E0-45AD-A83F-5414BF1498CF"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1000","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1000","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1001","sourceIdentifier":"cve@mitre.org","published":"1999-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Cache Engine allows a remote attacker to gain access via a null username and password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:cache_engine:1.0:*:*:*:*:*:*:*","matchCriteriaId":"FC01CC57-A2C6-4E39-9CCD-E5908C08F65E"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1001","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1001","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1004","sourceIdentifier":"cve@mitre.org","published":"1999-12-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:norton_antivirus:2000:*:*:*:*:*:*:*","matchCriteriaId":"A40E47AA-884D-40B4-8AD6-2532F2D9CB3E"}]}]}],"references":[{"url":"http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0%2Cpoproxy","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6267","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/38970","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/39194","source":"cve@mitre.org"},{"url":"http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0%2Cpoproxy","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6267","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/38970","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/39194","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1005","sourceIdentifier":"cve@mitre.org","published":"1999-12-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Groupwise web server GWWEB.EXE allows remote attackers to read arbitrary files with .htm extensions via a .. (dot dot) attack using the HELP parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.0.7a:*:*:*:*:*:*:*","matchCriteriaId":"4F386C07-2C07-4C68-A8F6-D2B590A99133"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:5.2:*:*:*:*:*:*:*","matchCriteriaId":"22426725-2204-4750-87F6-A57BA727F213"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*","matchCriteriaId":"A61E70C4-FE03-42AA-9F9B-C8DEB3E12F34"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94571433731824&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3413","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/879","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94571433731824&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3413","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/879","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1006","sourceIdentifier":"cve@mitre.org","published":"1999-12-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Groupwise web server GWWEB.EXE allows remote attackers to determine the real path of the web server via the HELP parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:5.2:*:*:*:*:*:*:*","matchCriteriaId":"22426725-2204-4750-87F6-A57BA727F213"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*","matchCriteriaId":"A61E70C4-FE03-42AA-9F9B-C8DEB3E12F34"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94571433731824&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94571433731824&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0997","sourceIdentifier":"cve@mitre.org","published":"1999-12-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wu-ftp with FTP conversion enabled allows an attacker to execute commands via a malformed file name that is interpreted as an argument to the program that does the conversion, e.g. tar or uncompress."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:millenux_gmbh:anonftp:2.8.1:*:*:*:*:*:*:*","matchCriteriaId":"54BD613B-52C9-4F57-B1B3-C7E38F829F91"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:wu-ftpd:2.4.2:*:*:*:*:*:*:*","matchCriteriaId":"82A23988-1494-4BFD-908A-78FE2BC7C33B"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:wu-ftpd:2.5.0:*:*:*:*:*:*:*","matchCriteriaId":"54D2322D-BBA4-4C36-81EC-E37FE8C87689"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:wu-ftpd:2.6.0:*:*:*:*:*:*:*","matchCriteriaId":"688CB1B7-D36C-4DA2-A261-07B23FCE1230"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"A8EED385-8C39-4A40-A507-2EFE7652FB35"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"}]}]}],"references":[{"url":"http://www.debian.org/security/2003/dsa-377","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2003/dsa-377","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Red Hat","comment":"Red Hat does not consider CVE-1999-0997 to be a security vulnerability.  The wu-ftpd process chroots itself into the target ftp directory and will only run external commands as the user logged into the ftp server.  Because the process chroots itself, an attacker needs a valid login with write access to the ftp server, and even then they could only potentially execute commands as themselves.","lastModified":"2006-09-27T00:00:00"}]}},{"cve":{"id":"CVE-2000-0020","sourceIdentifier":"cve@mitre.org","published":"1999-12-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DNS PRO allows remote attackers to conduct a denial of service via a large number of connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:man_and_mice:dns_pro:5.7:*:*:*:*:*:*:*","matchCriteriaId":"793A2A29-826E-4AF4-A823-F0C618012EBB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0020","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0020","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1497","sourceIdentifier":"cve@mitre.org","published":"1999-12-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EFEFE5A5-6589-4316-9C9F-2F8109696158"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"DB3992E3-D0C8-4A48-B4E1-D31B0D79CEE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.6:*:*:*:*:*:*:*","matchCriteriaId":"65248233-61A3-4085-8808-6FC2FD87EAF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.7:*:*:*:*:*:*:*","matchCriteriaId":"B37214DE-41E8-4DD4-AFBF-E608B88D6EAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.8:*:*:*:*:*:*:*","matchCriteriaId":"6E11FF5E-9B3D-4818-B091-1286ECF47937"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:*","matchCriteriaId":"9EADF489-0420-4C47-9F73-78114C2042F3"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/39329","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/880","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/39329","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/880","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0017","sourceIdentifier":"cve@mitre.org","published":"1999-12-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Linux linuxconf package allows remote attackers to gain root privileges via a long parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"B133DAC8-2B0D-4F83-9025-AD071740187A"}]}]}],"references":[{"url":"https://marc.info/?l=bugtraq&m=94580196627059&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=bugtraq&m=94580196627059&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0022","sourceIdentifier":"cve@mitre.org","published":"1999-12-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Lotus Domino HTTP server does not properly disable anonymous access for the cgi-bin directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_server:4.6:*:*:*:*:*:*:*","matchCriteriaId":"D3174854-2CC6-42C5-BC53-F64DE247AF77"},{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_server:4.6.x:*:*:*:*:*:*:*","matchCriteriaId":"E41E19DD-7BA0-4F03-881D-F7332FFB8E69"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/881","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/881","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0023","sourceIdentifier":"cve@mitre.org","published":"1999-12-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Lotus Domino HTTP server allows remote attackers to cause a denial of service via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_server:4.6:*:*:*:*:*:*:*","matchCriteriaId":"D3174854-2CC6-42C5-BC53-F64DE247AF77"},{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_server:4.6.x:*:*:*:*:*:*:*","matchCriteriaId":"E41E19DD-7BA0-4F03-881D-F7332FFB8E69"}]}]}],"references":[{"url":"http://www.osvdb.org/51","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/881","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/51","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/881","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0024","sourceIdentifier":"cve@mitre.org","published":"1999-12-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS does not properly canonicalize URLs, potentially allowing remote attackers to bypass access restrictions in third-party software via escape characters, aka the \"Escape Character Parsing\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server_commerce:3.0:*:*:*:*:*:*:*","matchCriteriaId":"DD78B678-82A4-4485-BC4A-809A5FB105E9"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246401","source":"cve@mitre.org"},{"url":"http://www.acrossecurity.com/aspr/ASPR-1999-11-10-1-PUB.txt","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-061","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246401","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.acrossecurity.com/aspr/ASPR-1999-11-10-1-PUB.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-061","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0025","sourceIdentifier":"cve@mitre.org","published":"1999-12-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.0 and Site Server 3.0 allow remote attackers to read source code for ASP files if the file is in a virtual directory whose name includes extensions such as .com, .exe, .sh, .cgi, or .dll, aka the \"Virtual Directory Naming\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server_commerce:3.0:*:*:*:*:*:*:*","matchCriteriaId":"DD78B678-82A4-4485-BC4A-809A5FB105E9"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238606","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/8098","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-058","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ238606","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/8098","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-058","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0026","sourceIdentifier":"cve@mitre.org","published":"1999-12-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in UnixWare i2odialogd daemon allows remote attackers to gain root access via a long username/password authorization string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:windowmaker:wmmon:1.0b2:*:*:*:*:*:*:*","matchCriteriaId":"12E1D19A-7891-4F5A-BD17-5C2D8978933A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94606167110764&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6310","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/876","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94606167110764&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6310","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/876","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1066","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Quake 1 server responds to an initial UDP game connection request with a large amount of traffic, which allows remote attackers to use the server as an amplifier in a \"Smurf\" style attack on another host, by spoofing the connection request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:quake_1_server:*:*:*:*:*:*:*:*","matchCriteriaId":"88349841-7A06-4200-8ADA-EB5965C017AB"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94589559631535&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94589559631535&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1109","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of ETRN commands then disconnecting from the server, while Sendmail continues to process the commands after the connection has been terminated."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*","versionEndIncluding":"8.10.0","matchCriteriaId":"08ADDC65-35BF-49BE-98C9-3BEA81183E81"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94632241202626&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94780566911948&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7760.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/904","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94632241202626&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94780566911948&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7760.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/904","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0002","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ZBServer Pro 1.50 allows remote attackers to execute commands via a long GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zbsoft:zbserver:1.5:*:*:*:*:*:*:*","matchCriteriaId":"0A92DFC9-A26E-418B-B1BC-565B27C81795"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94598388530358&w=2","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9912&L=NTBUGTRAQ&P=R3556","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/889","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=36B0596E.8D111D66%40teleline.es","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94598388530358&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9912&L=NTBUGTRAQ&P=R3556","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/889","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=36B0596E.8D111D66%40teleline.es","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0018","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wmmon in FreeBSD allows local users to gain privileges via the .wmmonrc configuration file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:windowmaker:wmmon:1.0b2:*:*:*:*:*:*:*","matchCriteriaId":"12E1D19A-7891-4F5A-BD17-5C2D8978933A"}]}]}],"references":[{"url":"http://www.osvdb.org/1169","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/885","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1169","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/885","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0030","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris dmispd dmi_cmd allows local users to fill up restricted disk space by adding files to the /var/dmi/db database."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/878","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/878","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0032","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Solaris dmi_cmd allows local users to crash the dmispd daemon by adding a malformed file to the /var/dmi/db database."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.osvdb.org/7582","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/878","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7582","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/878","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0034","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape 4.7 records user passwords in the preferences.js file during an IMAP or POP session, even if the user has not enabled \"remember passwords.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"38FD74F5-12ED-4049-B06F-0F22A0254C0F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0034","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0034","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0036","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Outlook Express 5 for Macintosh downloads attachments to HTML mail without prompting the user, aka the \"HTML Mail Attachment\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.5:*:macintosh:*:*:*:*:*","matchCriteriaId":"55EAB232-C39A-4737-85F3-3D727C727F2F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:5.0:*:macos:*:*:*:*:*","matchCriteriaId":"0C607D22-B01D-4404-9657-0D322CE59B0D"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249082","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-060","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249082","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-060","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0119","sourceIdentifier":"cve@mitre.org","published":"1999-12-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configurations for McAfee Virus Scan and Norton Anti-Virus virus checkers do not check files in the RECYCLED folder that is used by the Windows Recycle Bin utility, which allows attackers to store malicious code without detection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:virusscan:*:*:*:*:*:*:*:*","matchCriteriaId":"3B6140F3-9135-4490-A2A2-F8D0A1FEF8C2"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:norton_antivirus:*:*:*:*:*:*:*:*","matchCriteriaId":"7A58C09D-72A0-48E1-ABF0-49EBECA5D02B"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94936267131123&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94936267131123&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0001","sourceIdentifier":"cve@mitre.org","published":"1999-12-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RealMedia server allows remote attackers to cause a denial of service via a long ramgen request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"BE671A54-2E76-467E-8945-10982B79F4CE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/888","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/888","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0028","sourceIdentifier":"cve@mitre.org","published":"1999-12-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.0 and 5.01 allows remote attackers to bypass the cross frame security policy and read files via the external.NavigateAndFind function."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0:a_mac_os:*:*:*:*:*:*","matchCriteriaId":"35AA9DC0-0694-48FC-8652-831DFAB29226"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBF9241-A175-438C-A793-3D245BE2AE35"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"943D5C5C-FC49-4EDE-AE75-A79CFF42208E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.1:*:*:*:*:*:*:*","matchCriteriaId":"59EB6841-0427-479B-8771-06DF62EE3C87"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.2:*:*:*:*:*:*:*","matchCriteriaId":"8873A08F-D4C7-46FC-8FE5-972644F85ADA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp2:*:*:*:*:*:*","matchCriteriaId":"C375A9AA-505B-444C-A45F-2BAAD0B2CD0D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*","matchCriteriaId":"44FF4E47-AD75-42C7-BB84-42BBA46A58B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.5:*:*:*:*:*:*:*","matchCriteriaId":"1B26CE22-E730-4247-853E-5E640DB3ECB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.1:*:*:*:*:*:*:*","matchCriteriaId":"B1CFF390-FF33-45CA-BC96-C6766491C616"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0028","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0028","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0038","sourceIdentifier":"cve@mitre.org","published":"1999-12-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"glFtpD includes a default glftpd user account with a default password and a UID of 0."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:glftpd:glftpd:*:*:*:*:*:*:*:*","versionEndIncluding":"1.17.2","matchCriteriaId":"A3E9A6FF-24D4-4900-8112-B18679318534"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0038","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0040","sourceIdentifier":"cve@mitre.org","published":"1999-12-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"glFtpD allows local users to gain privileges via metacharacters in the SITE ZIPCHK command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:glftpd:glftpd:1.17.2:*:*:*:*:*:*:*","matchCriteriaId":"06212998-AE09-4DA2-9F9C-EBB60BBD7EBB"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0040","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0892","sourceIdentifier":"cve@mitre.org","published":"1999-12-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Netscape Communicator before 4.7 via a dynamic font whose length field is less than the size of the font."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0892","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0892","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0455","sourceIdentifier":"cve@mitre.org","published":"1999-12-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Expression Evaluator sample application in ColdFusion allows remote attackers to read or delete files on the server via exprcalc.cfm, which does not restrict access to the server properly."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C334CA02-D4EC-40D0-B75F-AFBC0F3903E8"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/115","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-0477","sourceIdentifier":"cve@mitre.org","published":"1999-12-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Expression Evaluator in the ColdFusion Application Server allows a remote attacker to upload files to the server via openfile.cfm, which does not restrict access to the server properly."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"EE00F45E-C410-4268-B0EC-18B4043E6631"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7BB5B124-A5C2-4B24-8091-FF9863D17BF2"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:3.01:*:*:*:*:*:*:*","matchCriteriaId":"A32F27D3-0ECD-49BB-B32F-2F531DE6836D"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:3.11:*:*:*:*:*:*:*","matchCriteriaId":"9646F809-1016-49AD-B60A-481CDB7D5ECF"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:3.12:*:*:*:*:*:*:*","matchCriteriaId":"926AAAD1-68C5-4816-B387-8B1BB4E9E1C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C334CA02-D4EC-40D0-B75F-AFBC0F3903E8"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/115","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0006","sourceIdentifier":"cve@mitre.org","published":"1999-12-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"strace allows local users to read arbitrary files via memory mapped file names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:N","baseScore":2.6,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:paul_kranenburg:strace:*:*:*:*:*:*:*:*","matchCriteriaId":"52BF9814-611A-45A0-9773-3D2DCC3BC93A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.3.20:*:*:*:*:*:*:*","matchCriteriaId":"D6ECC079-EBD4-4E01-9CAC-A4FC84F79656"}]}]}],"references":[{"url":"http://online.securityfocus.com/archive/1/39831","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4554","source":"cve@mitre.org"},{"url":"http://online.securityfocus.com/archive/1/39831","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4554","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0008","sourceIdentifier":"cve@mitre.org","published":"1999-12-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTPPro allows local users to read sensitive information, which is stored in plain text."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:1st_choice_software:ftppro:7.5:*:*:*:*:*:*:*","matchCriteriaId":"18FCD28B-908C-4F39-8A74-E7FCD1A4EC61"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0008","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0008","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0010","sourceIdentifier":"cve@mitre.org","published":"1999-12-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WebWho+ whois.cgi program allows remote attackers to execute commands via shell metacharacters in the TLD parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:tony_greenwood:webwho\\+:1.1:*:*:*:*:*:*:*","matchCriteriaId":"41F15172-51F6-46B3-9B95-3E52A8DFD1A6"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0010","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0010","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0012","sourceIdentifier":"cve@mitre.org","published":"1999-12-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in w3-msql CGI program in miniSQL package allows remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hughes:msql:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"4F2D54A4-BFAD-4C4E-B356-58FB6B850CBD"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/898","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/898","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0027","sourceIdentifier":"cve@mitre.org","published":"1999-12-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IBM Network Station Manager NetStation allows local users to gain privileges via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:network_station_manager:2.0r1:*:*:*:*:*:*:*","matchCriteriaId":"3857682E-352E-45CB-80F4-7C92AD32AA21"}]}]}],"references":[{"url":"http://www.iss.net/security_center/static/5381.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/39962","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/900","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/5381.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/39962","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/900","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0029","sourceIdentifier":"cve@mitre.org","published":"1999-12-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UnixWare pis and mkpis commands allow local users to gain privileges via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94780294009285&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/901","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94780294009285&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/901","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0033","sourceIdentifier":"cve@mitre.org","published":"1999-12-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"InterScan VirusWall SMTP scanner does not properly scan messages with malformed attachments."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"DEC14336-CD53-44F7-B271-3C98C016295B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/899","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/899","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0060","sourceIdentifier":"cve@mitre.org","published":"1999-12-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in aVirt Rover POP3 server 1.1 allows remote attackers to cause a denial of service via a long user name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:avirt:rover:1.1:*:*:*:*:*:*:*","matchCriteriaId":"0FD726D2-67D8-4511-8C32-86E28791E905"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94633851427858&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94647711311057&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/3765.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/894","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94633851427858&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94647711311057&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/3765.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/894","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1573","sourceIdentifier":"cve@mitre.org","published":"1999-12-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple unknown vulnerabilities in the \"r-cmnds\" (1) remshd, (2) rexecd, (3) rlogind, (4) rlogin, (5) remsh, (6) rcp, (7) rexec, and (8) rdist for HP-UX 10.00 through 11.00 allow attackers to gain privileges or access files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*","matchCriteriaId":"3187435B-C052-4DBA-AA79-F8AC0287EE14"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*","matchCriteriaId":"53BBFE9A-6846-4625-91AC-47AA0BC0933A"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www.auscert.org.au/render.html?it=490","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.ciac.org/ciac/bulletins/j-022.shtml","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.kb.cert.org/vuls/id/13217","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/advisories/1471","source":"cve@mitre.org","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7860","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5550","source":"cve@mitre.org"},{"url":"http://www.auscert.org.au/render.html?it=490","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.ciac.org/ciac/bulletins/j-022.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.kb.cert.org/vuls/id/13217","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.securityfocus.com/advisories/1471","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7860","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5550","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0014","sourceIdentifier":"cve@mitre.org","published":"1999-12-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Denial of service in Savant web server via a null character in the requested URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:michael_lamont:savant_webserver:2.0:*:*:*:*:*:*:*","matchCriteriaId":"B40F344E-4968-4320-9423-5DC9204839A1"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/897","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/897","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0035","sourceIdentifier":"cve@mitre.org","published":"1999-12-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"resend command in Majordomo allows local users to gain privileges via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:*:*:*:*:*:*:*:*","versionEndIncluding":"1.94.4","matchCriteriaId":"41A554BD-EF4B-41AF-AA3B-7C6276C6150D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94780294009285&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/902","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94780294009285&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/902","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0037","sourceIdentifier":"cve@mitre.org","published":"1999-12-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Majordomo wrapper allows local users to gain privileges by specifying an alternate configuration file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:1.94.4:*:*:*:*:*:*:*","matchCriteriaId":"87D144BA-FE24-4894-BF02-03646750D298"},{"vulnerable":true,"criteria":"cpe:2.3:a:great_circle_associates:majordomo:1.94.5:*:*:*:*:*:*:*","matchCriteriaId":"FE7CCEAA-C667-4201-9986-90FD17EE3F90"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94780294009285&w=2","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-005.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/903","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94780294009285&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-005.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/903","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0041","sourceIdentifier":"cve@mitre.org","published":"1999-12-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Macintosh systems generate large ICMP datagrams in response to malformed datagrams, allowing them to be used as amplifiers in a flood attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:macos:9.0:*:*:*:*:*:*:*","matchCriteriaId":"5717CFDB-1070-408F-B769-9C9349316603"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/890","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/890","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0007","sourceIdentifier":"cve@mitre.org","published":"1999-12-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Trend Micro PC-Cillin does not restrict access to its internal proxy port, allowing remote attackers to conduct a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:pc-cillin:6.0:*:*:*:*:*:*:*","matchCriteriaId":"ABBAA86F-8DE4-4BC8-B295-89CF981C28D0"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1740","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4491","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1740","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4491","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0009","sourceIdentifier":"cve@mitre.org","published":"1999-12-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The bna_pass program in Optivity NETarchitect uses the PATH environmental variable for finding the \"rm\" program, which allows local users to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nortel:optivity_net_architect:2.0:*:*:*:*:*:*:*","matchCriteriaId":"967C31EC-D5EE-46CF-A02E-F4E75B6D1F13"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/907","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/907","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0039","sourceIdentifier":"cve@mitre.org","published":"1999-12-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AltaVista search engine allows remote attackers to read files above the document root via a .. (dot dot) in the query.cgi CGI program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:altavista:search_intranet:2.0b:*:*:*:*:*:*:*","matchCriteriaId":"6707B25F-EA7E-4E48-8D5F-E0FB2E22C386"},{"vulnerable":true,"criteria":"cpe:2.3:a:altavista:search_intranet:2.3a:*:*:*:*:*:*:*","matchCriteriaId":"A4E23292-1245-44C6-95DE-D025FD332B83"}]}]}],"references":[{"url":"http://www.osvdb.org/15","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/896","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/15","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/896","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0042","sourceIdentifier":"cve@mitre.org","published":"1999-12-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CSM mail server allows remote attackers to cause a denial of service or execute commands via a long HELO command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:1999-07b:*:*:*:*:*:*:*","matchCriteriaId":"762E296C-385B-4945-8B21-03C74FF9C179"},{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:1999-07f:*:*:*:*:*:*:*","matchCriteriaId":"4D47465D-2356-4957-9353-A04EA64CD245"},{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:1999-07g:*:*:*:*:*:*:*","matchCriteriaId":"93EC74A4-8032-4659-AE85-C15A323CC985"},{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:1999-07h:*:*:*:*:*:*:*","matchCriteriaId":"D1E107C0-90A2-43C2-9598-4646AE3077FB"},{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:1999-07i:*:*:*:*:*:*:*","matchCriteriaId":"8C854FD9-4CAE-4CB5-8F9E-BE5462953F1D"},{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:1999-07m:*:*:*:*:*:*:*","matchCriteriaId":"A7724772-D4C2-4053-97D6-EA8520C08E21"},{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:2000-01a:*:*:*:*:*:*:*","matchCriteriaId":"55CDCFC5-4815-4F25-85A4-A3072869D4B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:csm:mail_server:2000.8.a:*:*:*:*:*:*:*","matchCriteriaId":"89BEFB57-EB66-41AD-B2D2-69EC3C6B74C7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/895","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/895","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0100","sourceIdentifier":"cve@mitre.org","published":"1999-12-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SMS Remote Control program is installed with insecure permissions, which allows local users to gain privileges by modifying or replacing the program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:systems_management_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"43E8A8EF-B54F-4413-9BC8-A6A479951313"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/current/0045.html","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-012","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/current/0045.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-012","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0001","sourceIdentifier":"cve@mitre.org","published":"1999-12-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets."},{"lang":"es","value":"ip_input.c en implementaciones de TCP/IP derivadas de BSD permiten a atacantes remotos causar una denegación de servicio (cuelgue o caída) mediante paquetes artesanales."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*","matchCriteriaId":"950CE88E-E396-4D32-AC9D-B76EB2B537C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*","matchCriteriaId":"44EFD22E-02C9-4B80-8934-A9AC8DD858CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*","matchCriteriaId":"B1B4D4A5-25EB-48FE-BDFD-A274CE802648"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*","matchCriteriaId":"F3A037F1-98AD-47CC-8D83-B42666E1B61E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"63236405-1F33-43DD-ACF7-B6D9656E0987"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"7891202C-62AF-4590-9E5F-3514FDA2B38E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*","matchCriteriaId":"CF4F7002-A525-4A66-BE8B-E50ABBF144B2"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","matchCriteriaId":"BF8F9B2F-E898-4F87-A245-32A41748587B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","matchCriteriaId":"314BA420-4C74-4060-8ACE-D7A7C041CF2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*","matchCriteriaId":"2EAD7613-A5B3-4621-B981-290C7C6B8BA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","matchCriteriaId":"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*","matchCriteriaId":"1D2DA7F0-E3C0-447A-A2B0-ECC928389D84"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*","matchCriteriaId":"FEBE290B-5EC6-4BBA-B645-294C150E417A"}]}]}],"references":[{"url":"http://www.openbsd.org/errata23.html#tcpfix","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/5707","source":"cve@mitre.org"},{"url":"http://www.openbsd.org/errata23.html#tcpfix","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/5707","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0003","sourceIdentifier":"cve@mitre.org","published":"1999-12-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in UnixWare rtpm program allows local users to gain privileges via a long environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:*:*:*:*:*:*:*:*","matchCriteriaId":"FAD1D156-6B19-4185-A42C-5FE2E7A5545C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94908470928258&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94908470928258&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0043","sourceIdentifier":"cve@mitre.org","published":"1999-12-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CamShot WebCam HTTP server allows remote attackers to execute commands via a long GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:camshot:webcam_http_server:2.5:*:*:*:*:*:*:*","matchCriteriaId":"A16C36F1-2CB1-41E6-A12E-E95ACAA5F8AE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/905","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/905","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0076","sourceIdentifier":"cve@mitre.org","published":"1999-12-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"nviboot boot script in the Debian nvi package allows local users to delete files via malformed entries in vi.recover."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:berkeley:nvi:1.7x:*:*:*:*:*:*:*","matchCriteriaId":"B78598E7-08B7-4A4C-8324-ED57E2F12FF7"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94709988232618&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1439","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94709988232618&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1439","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0154","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E701AB0D-E335-47DF-A0CA-607D5C6E9255"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0154","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0154","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0808","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple buffer overflows in ISC DHCP Distribution server (dhcpd) 1.0 and 2.0 allow a remote attacker to cause a denial of service (crash) and possibly execute arbitrary commands via long options."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:dhcp_client:1.0:*:*:*:*:*:*:*","matchCriteriaId":"140431BA-D68C-4688-AAB0-79D557ACFF86"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:dhcp_client:2.0:*:*:*:*:*:*:*","matchCriteriaId":"AEB862F1-3C18-42AA-9E7A-1BEF321618AE"}]}]}],"references":[{"url":"ftp://ftp.isc.org/isc/dhcp/dhcp-1.0-history/dhcp-1.0.0-1.0pl1.diff.gz","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-053.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=90221101925960&w=2","source":"cve@mitre.org"},{"url":"ftp://ftp.isc.org/isc/dhcp/dhcp-1.0-history/dhcp-1.0.0-1.0pl1.diff.gz","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-053.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=90221101925960&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0815","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Memory leak in SNMP agent in Windows NT 4.0 before SP5 allows remote attackers to conduct a denial of service (memory exhaustion) via a large number of queries."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:server:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"CD8FDB19-E847-46B2-B938-8059145FDD82"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q196/2/70.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1974","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A952","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q196/2/70.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1974","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A952","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1035","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 3.0 and 4.0 on x86 and Alpha allows remote attackers to cause a denial of service (hang) via a malformed GET request, aka the IIS \"GET\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q192/2/96.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-019","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1823","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q192/2/96.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-019","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1823","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1042","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Resource Manager (CRM) 1.0 and 1.1 creates world-readable log files and temporary files, which may expose sensitive information, to local users such as user IDs, passwords and SNMP community strings."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:N/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:resource_manager:1.0:*:*:*:*:*:*:*","matchCriteriaId":"6CD172F3-4964-410A-A7E9-5659DE662734"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:resource_manager:1.1:*:*:*:*:*:*:*","matchCriteriaId":"8305C239-6496-4CF9-9515-FDE7478877E7"}]}]}],"references":[{"url":"http://www.cisco.com/warp/public/770/crmtmp-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/crmtmp-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1043","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Exchange Server 5.5 and 5.0 does not properly handle (1) malformed NNTP data, or (2) malformed SMTP data, which allows remote attackers to cause a denial of service (application error)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.0:-:*:*:*:*:*:*","matchCriteriaId":"D823C88E-8560-469B-8655-4755E0484F14"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*","matchCriteriaId":"B4F9C143-4734-4E5D-9281-F51513C5CAAF"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-007","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-007","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1055","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Excel 97 does not warn the user before executing worksheet functions, which could allow attackers to execute arbitrary commands by using the CALL function to execute a malicious DLL, aka the Excel \"CALL Vulnerability.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:excel:97:*:*:*:*:*:*:*","matchCriteriaId":"A78536AA-8694-4E0E-B7C6-9E5C3787D849"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/179","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-018","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1737","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/179","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-018","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1737","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1074","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Webmin before 0.5 does not restrict the number of invalid passwords that are entered for a valid username, which could allow remote attackers to gain privileges via brute force password cracking."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.1:*:*:*:*:*:*:*","matchCriteriaId":"30E3CF12-D0B7-4C7F-96C8-36A3FAFA8EDF"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.2:*:*:*:*:*:*:*","matchCriteriaId":"C808C470-F0A1-4338-A988-3968EABE78E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.3:*:*:*:*:*:*:*","matchCriteriaId":"C16685C0-94E9-4AE6-8221-1D32112808F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.4:*:*:*:*:*:*:*","matchCriteriaId":"EDACA626-1687-4192-A2E8-C74823B715A5"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.21:*:*:*:*:*:*:*","matchCriteriaId":"84B5A02C-96AB-46FD-A958-86AC0DFD1F2A"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.22:*:*:*:*:*:*:*","matchCriteriaId":"BB1B8073-C512-4ACA-8E3F-92D46D63FBCF"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.31:*:*:*:*:*:*:*","matchCriteriaId":"B368FAD0-39A7-4115-9327-1D32BECF2F7E"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.41:*:*:*:*:*:*:*","matchCriteriaId":"2B3D7B7A-0426-4176-A759-E96024DC492D"},{"vulnerable":true,"criteria":"cpe:2.3:a:webmin:webmin:0.42:*:*:*:*:*:*:*","matchCriteriaId":"1E3EFDEE-A99B-4D0E-B6A7-E7C285A5DFBC"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/9138","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98","source":"cve@mitre.org"},{"url":"http://www.webmin.com/webmin/changes.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/archive/1/9138","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/98","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.webmin.com/webmin/changes.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1084","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The \"AEDebug\" registry key is installed with insecure permissions, which allows local users to modify the key to specify a Trojan Horse debugger which is automatically executed on a system crash."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*","matchCriteriaId":"7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:workstation:*:*:*:*:*","matchCriteriaId":"35346A7B-2CB5-446D-B0C3-1F21D71A746D"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=90222453431604&w=2","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q103/8/61.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/k-029.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1044","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-008","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=90222453431604&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/q103/8/61.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.ciac.org/ciac/bulletins/k-029.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1044","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-008","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1087","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4 treats a 32-bit number (\"dotless IP address\") in the a URL as the hostname instead of an IP address, which causes IE to apply Local Intranet Zone settings to the resulting web page, allowing remote malicious web servers to conduct unauthorized activities by using URLs that contain the dotless IP address for their server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:sp1:*:*:*:*:*:*","matchCriteriaId":"0AF9C64F-9A67-4BA9-A653-75507935E6EA"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q168/6/17.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.microsoft.com/Windows/Ie/security/dotless.asp","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7828","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-016","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2209","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q168/6/17.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.microsoft.com/Windows/Ie/security/dotless.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/7828","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-016","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2209","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1093","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the Window.External function in the JScript Scripting Engine in Internet Explorer 4.01 SP1 and earlier allows remote attackers to execute arbitrary commands via a malicious web page."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:*:sp1:*:*:*:*:*:*","versionEndIncluding":"4.0.1","matchCriteriaId":"F185D0D0-43CE-4C46-9D34-47B7B26F6E36"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q191/2/00.asp","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/1276.php","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-011","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q191/2/00.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/1276.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-011","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1094","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Internet Explorer 4.01 and earlier allows remote attackers to execute arbitrary commands via a long URL with the \"mk:\" protocol, aka the \"MK Overrun security issue.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0.1","matchCriteriaId":"40B7DC57-531A-4BE6-8FB4-83975971F88C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88480839506155&w=2","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/917","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88480839506155&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/917","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1100","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco PIX Private Link 4.1.6 and earlier does not properly process certain commands in the configuration file, which reduces the effective key length of the DES key to 48 bits instead of 56 bits, which makes it easier for an attacker to find the proper key via a brute force attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:pix_private_link:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1\\(6\\)","matchCriteriaId":"E124299F-F51D-4603-B0E8-10E542360372"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/i-056.shtml","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/770/pixkey-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1579","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-056.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cisco.com/warp/public/770/pixkey-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1579","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1102","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"lpr on SunOS 4.1.1, BSD 4.3, A/UX 2.0.1, and other BSD-based operating systems allows local users to create or overwrite arbitrary files via a symlink attack that is triggered after invoking lpr 1000 times."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*","versionEndIncluding":"5.2","matchCriteriaId":"32EF3E35-E1CA-41E3-BB94-0A914E3B7883"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:apple:a_ux:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"6BDBAF8D-C7F4-470C-8A74-F0BF178D07EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:bsd:bsd:4.3:*:*:*:*:*:*:*","matchCriteriaId":"388BB5C2-53B3-4597-913C-7D86E585CCD5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:*:*:*:*:*:*:*:*","versionEndIncluding":"4.1.1","matchCriteriaId":"BD213C54-28D3-4584-95D2-E28732BC649A"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/e-25.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.aenigma.net/resources/maillist/bugtraq/1994/0091.htm","source":"cve@mitre.org"},{"url":"http://www.phreak.org/archives/security/8lgm/8lgm.lpr","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/e-25.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.aenigma.net/resources/maillist/bugtraq/1994/0091.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.phreak.org/archives/security/8lgm/8lgm.lpr","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1104","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 95 uses weak encryption for the password list (.pwl) file used when password caching is enabled, which allows local users to gain privileges by decrypting the passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87602167418931&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88536273725787&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=88540877601866&w=2","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q140/5/57.asp","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/71.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167418931&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=88536273725787&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=88540877601866&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/q140/5/57.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/71.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1105","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 95, when Remote Administration and File Sharing for NetWare Networks is enabled, creates a share (C$) when an administrator logs in remotely, which allows remote attackers to read arbitrary files by mapping the network drive."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"}]}]}],"references":[{"url":"http://www.iss.net/security_center/static/7231.php","source":"cve@mitre.org"},{"url":"http://www.net-security.sk/bugs/NT/netware1.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.zdnet.com/eweek/reviews/1016/tr42bug.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7231.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.net-security.sk/bugs/NT/netware1.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.zdnet.com/eweek/reviews/1016/tr42bug.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1117","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"lquerypv in AIX 4.1 and 4.2 allows local users to read arbitrary files by specifying the file in the -h command line parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/h-13.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420195&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602167420196&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&w=2&r=1&s=lquerypv&q=b","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/455","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1752","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/h-13.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=87602167420195&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602167420196&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&w=2&r=1&s=lquerypv&q=b","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/455","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1752","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1124","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HTTP Client application in ColdFusion allows remote attackers to bypass access restrictions for web pages on other ports by providing the target page to the mainframeset.cfm application, which requests the page from the server, making it look like the request is coming from the local host."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion:*:*:*:*:*:*:*:*","matchCriteriaId":"6DA88352-88EF-48A1-A50B-572C78A090A6"}]}]}],"references":[{"url":"http://packetstorm.securify.com/mag/phrack/phrack54/P54-08","source":"cve@mitre.org"},{"url":"http://packetstorm.securify.com/mag/phrack/phrack54/P54-08","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1126","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Resource Manager (CRM) 1.1 and earlier creates certain files with insecure permissions that allow local users to obtain sensitive configuration information including usernames, passwords, and SNMP community strings, from (1) swim_swd.log, (2) swim_debug.log, (3) dbi_debug.log, and (4) temporary files whose names begin with \"DPR_\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:resource_manager:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1","matchCriteriaId":"28FD65FA-AF10-44E8-B13C-69CB4CA1A124"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/i-086.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/crmtmp-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1575","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-086.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/crmtmp-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1575","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1127","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 does not properly shut down invalid named pipe RPC connections, which allows remote attackers to cause a denial of service (resource exhaustion) via a series of connections containing malformed data, aka the \"Named Pipes Over RPC\" vulnerability."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-772"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:enterprise:*:*:*","matchCriteriaId":"FA9FD6FB-7D96-42C9-AA8D-654A29FCA465"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:server:*:*:*","matchCriteriaId":"B48A648C-7D20-4546-B288-FBC795D8FE73"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:terminal_server:*:*:*","matchCriteriaId":"E30F6C9C-3371-44FF-AD0B-3CAA0AB6F1B8"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:-:*:*:workstation:*:*:*","matchCriteriaId":"22BA7A30-849D-411B-A790-FC175435379B"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/Q195/7/33.asp","source":"cve@mitre.org","tags":["Broken Link","Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/523.php","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-017","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://support.microsoft.com/support/kb/articles/Q195/7/33.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/523.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-017","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1132","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 allows remote attackers to cause a denial of service (crash) via extra source routing data such as (1) a Routing Information Field (RIF) field with a hop count greater than 7, or (2) a list containing duplicate Token Ring IDs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90763508011966&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=90760603030452&w=2","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/Q179/1/57.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/1399.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90763508011966&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=90760603030452&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/Q179/1/57.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/1399.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1148","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTP service in IIS 4.0 and earlier allows remote attackers to cause a denial of service (resource exhaustion) via many passive (PASV) connections at the same time."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"4B21A3CA-6F3B-4C27-A704-A9B8D9A60C15"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/Q189/2/62.ASP","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-006","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1215","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/Q189/2/62.ASP","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-006","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1215","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1157","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Tcpip.sys in Windows NT 4.0 before SP4 allows remote attackers to cause a denial of service via an ICMP Subnet Mask Address Request packet, when certain multiple IP addresses are bound to the same network interface."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"2DA4F4D4-444B-4CD8-A6E6-159303786DF8"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/Q192/7/74.ASP","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3894","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/Q192/7/74.ASP","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3894","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1167","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross-site scripting vulnerability in Third Voice Web annotation utility allows remote users to read sensitive data and generate fake web pages for other Third Voice users by injecting malicious Javascript into an annotation."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:third_voice:third_voice_web:*:*:*:*:*:*:*:*","matchCriteriaId":"39EAEEEC-D079-4F30-AA71-F021D48F14C0"}]}]}],"references":[{"url":"http://www.iss.net/security_center/static/7252.php","source":"cve@mitre.org"},{"url":"http://www.wired.com/news/technology/0%2C1282%2C20636%2C00.html","source":"cve@mitre.org"},{"url":"http://www.wired.com/news/technology/0%2C1282%2C20677%2C00.html","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7252.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.wired.com/news/technology/0%2C1282%2C20636%2C00.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.wired.com/news/technology/0%2C1282%2C20677%2C00.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1175","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Web Cache Control Protocol (WCCP) in Cisco Cache Engine for Cisco IOS 11.2 and earlier does not use authentication, which allows remote attackers to redirect HTTP traffic to arbitrary hosts via WCCP packets to UDP port 2048."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*","versionEndIncluding":"11.2","matchCriteriaId":"CEE938DF-8451-46DD-A532-1EF99DE8852D"}]}]}],"references":[{"url":"http://www.ciac.org/ciac/bulletins/i-054.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/wccpauth-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1577","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/i-054.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/wccpauth-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1577","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1177","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in nph-publish before 1.2 allows remote attackers to overwrite arbitrary files via a .. (dot dot) in the pathname for an upload operation."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lincoln_d._stein:nph-publish:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2","matchCriteriaId":"4B1AFE71-C20B-4FD8-A43A-563F42048715"}]}]}],"references":[{"url":"http://www-genome.wi.mit.edu/WWW/tools/CGI_scripts/server_publish/nph-publish","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.w3.org/Security/Faq/wwwsf4.html","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2055","source":"cve@mitre.org"},{"url":"http://www-genome.wi.mit.edu/WWW/tools/CGI_scripts/server_publish/nph-publish","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.w3.org/Security/Faq/wwwsf4.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2055","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1206","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SystemSoft SystemWizard package in HP Pavilion PC with Windows 98, and possibly other platforms and operating systems, installs two ActiveX controls that are marked as safe for scripting, which allows remote attackers to execute arbitrary commands via a malicious web page that references (1) the Launch control, or (2) the RegObj control."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:systemsoft:systemwizard:*:*:*:*:*:*:*:*","matchCriteriaId":"E5B57640-D538-4DB5-8E68-7B06B08EEDE5"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93336970231857&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/555","source":"cve@mitre.org"},{"url":"http://www.systemsoft.com/l-2/l-3/support-systemwizard.htm","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93336970231857&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/555","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.systemsoft.com/l-2/l-3/support-systemwizard.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1222","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/Q188/5/71.ASP","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3893","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/Q188/5/71.ASP","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3893","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1223","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 3.0 allows remote attackers to cause a denial of service via a request to an ASP page in which the URL contains a large number of / (forward slash) characters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q187/5/03.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3892","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q187/5/03.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3892","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1233","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.0 does not properly restrict access for the initial session request from a user's IP address if the address does not resolve to a DNS domain, aka the \"Domain Resolution\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/Q241/5/62.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/657","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3306","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/Q241/5/62.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/657","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-039","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3306","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1246","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Direct Mailer feature in Microsoft Site Server 3.0 saves user domain names and passwords in plaintext in the TMLBQueue network share, which has insecure default permissions, allowing remote attackers to read the passwords and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/Q229/9/72.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2068","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/Q229/9/72.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2068","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1259","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Office 98, Macintosh Edition, does not properly initialize the disk space used by Office 98 files and effectively inserts data from previously deleted files into the Office file, which could allow attackers to obtain sensitive information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:98:*:mac:*:*:*:*:*","matchCriteriaId":"36227AF5-8A53-41E3-88E3-5978C22BBAB2"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q189/5/29.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1780","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q189/5/29.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1780","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1279","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An interaction between the AS/400 shared folders feature and Microsoft SNA Server 3.0 and earlier allows users to view each other's folders when the users share the same Local APPC LU."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sna_server:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0","matchCriteriaId":"15075075-9FD9-4E2E-B77F-E143855B86AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sna_server:2.11:*:*:*:*:*:*:*","matchCriteriaId":"E9DD2968-5976-450D-8741-D86931246DF7"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q138/0/01.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1548","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q138/0/01.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1548","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1287","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Analog 3.0 and earlier allows remote attackers to read arbitrary files via the forms interface."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stephen_turner:analog:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0","matchCriteriaId":"895314ED-7265-400B-8329-A7DA403F4788"}]}]}],"references":[{"url":"http://www.statslab.cam.ac.uk/~sret1/analog/security.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1410","source":"cve@mitre.org"},{"url":"http://www.statslab.cam.ac.uk/~sret1/analog/security.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1410","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1290","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in nftp FTP client version 1.40 allows remote malicious FTP servers to cause a denial of service, and possibly execute arbitrary commands, via a long response string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:chris_matthee:nftp:1.40:*:*:*:*:*:*:*","matchCriteriaId":"31FF23CA-2441-4C94-A5D2-ECA896EA7129"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91127951426494&w=2","source":"cve@mitre.org"},{"url":"http://www.ayukov.com/nftp/history.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1397","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91127951426494&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ayukov.com/nftp/history.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1397","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1293","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"mod_proxy in Apache 1.2.5 and earlier allows remote attackers to cause a denial of service via malformed FTP commands, which causes Apache to dump core."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.5","matchCriteriaId":"12268438-58C9-401E-8B20-7D7097797759"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88413292830649&w=2","source":"cve@mitre.org"},{"url":"http://www.apache.org/info/security_bulletin_1.2.5.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=88413292830649&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.apache.org/info/security_bulletin_1.2.5.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1294","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Office Shortcut Bar (OSB) in Windows 3.51 enables backup and restore permissions, which are inherited by programs such as File Manager that are started from the Shortcut Bar, which could allow local users to read folders for which they do not have permission."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.51:*:*:*:*:*:*:*","matchCriteriaId":"60A471C3-BE72-440E-84A8-55C6F9D362F4"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q146/6/04.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/562","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q146/6/04.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/562","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1300","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in accton in Cray UNICOS 6.1 and 6.0 allows local users to read arbitrary files and modify system accounting configuration."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.0:*:*:*:*:*:*:*","matchCriteriaId":"3E7725DD-085A-4D3A-8F9E-55C3D4BBDD1B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cray:unicos:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACCD6F58-9E37-40F0-AFD5-49523BEA301E"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/b-31.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/b-31.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1307","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in urestore in Novell UnixWare 1.1 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:unixware:1.1:*:*:*:*:*:*:*","matchCriteriaId":"C9B59744-C8BE-4ED8-9820-ECF29C5C7EB3"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-06.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_4/0676.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-06.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.dataguard.no/bugtraq/1994_4/0676.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1315","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerabilities in DECnet/OSI for OpenVMS before 5.8 on DEC Alpha AXP and VAX/VMS systems allow local users to gain privileges or cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dec:dec_openvms:*:*:*:*:*:*:*:*","versionEndIncluding":"5.8","matchCriteriaId":"7770FB2F-EA4E-4DF9-A2FC-8C2723610414"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/f-04.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/f-04.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1316","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Passfilt.dll in Windows NT SP2 allows users to create a password that contains the user's name, which could make it easier for an attacker to guess."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:server:*:*:*:*:*","matchCriteriaId":"656AE014-AEEC-46E8-A696-61FEA7932F21"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/Q247/9/75.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7391","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/Q247/9/75.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7391","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1317","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 SP4 and earlier allows local users to gain privileges by modifying the symbolic link table in the \\?? object folder using a different case letter (upper or lower) to point to a different device."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:sp4:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"0CC5B755-839E-494F-A96B-0BC94CF15C97"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=92127046701349&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92162979530341&w=2","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q222/1/59.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7398","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=92127046701349&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=92162979530341&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/q222/1/59.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7398","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1320","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Novell NetWare 3.x and earlier allows local users to gain privileges via packet spoofing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*","versionEndIncluding":"3.0","matchCriteriaId":"07D7AF4E-1AC1-4615-A389-5C16AA7003BE"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/d-01.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7213.php","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/d-01.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7213.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1324","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"VAXstations running Open VMS 5.3 through 5.5-2 with VMS DECwindows or MOTIF do not properly disable access to user accounts that exceed the break-in limit threshold for failed login attempts, which makes it easier for attackers to conduct brute force password guessing."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-307"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:openvms_vax:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3","versionEndIncluding":"5.5.2","matchCriteriaId":"8EC148C6-C2CE-4347-AB6A-6B58C84CDF77"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/d-06.shtml","source":"cve@mitre.org","tags":["Broken Link","Patch","Third Party Advisory","US Government Resource","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7225","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/d-06.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Patch","Third Party Advisory","US Government Resource","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7225","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-1325","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SAS System 5.18 on VAX/VMS is installed with insecure permissions for its directories and startup file, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vax_vms:sas_system:5.18:*:*:*:*:*:*:*","matchCriteriaId":"AB89B11E-753E-4A80-97CE-531D21D4783E"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/c-19.shtml","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7261","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/c-19.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7261","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1327","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in linuxconf 1.11r11-rh2 on Red Hat Linux 5.1 allows local users to gain root privileges via a long LANG environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90221103125826&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7239.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6065","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh51-errata-general.html#linuxconf","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90221103125826&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7239.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6065","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh51-errata-general.html#linuxconf","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1328","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"linuxconf before 1.11.r11-rh3 on Red Hat Linux 5.1 allows local users to overwrite arbitrary files and gain root access via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=90383955231511&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7232.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6068","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh51-errata-general.html#linuxconf","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90383955231511&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7232.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6068","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh51-errata-general.html#linuxconf","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1329","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SysVInit in Red Hat Linux 5.1 and earlier allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","versionEndIncluding":"5.1","matchCriteriaId":"64596B09-9E41-479E-9C66-01DCACE2282F"}]}]}],"references":[{"url":"http://www.iss.net/security_center/static/7250.php","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#SysVinit","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7250.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#SysVinit","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1330","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The snprintf function in the db library 1.85.4 ignores the size parameter, which could allow attackers to exploit buffer overflows that would be prevented by a properly implemented snprintf."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F92AB32-E7DE-43F4-B877-1F41FA162EC7"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"}]}]}],"references":[{"url":"http://lists.openresources.com/Debian/debian-bugs-closed/msg00581.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87602661419259&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7244.php","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh42-errata-general.html#db","source":"cve@mitre.org"},{"url":"http://lists.openresources.com/Debian/debian-bugs-closed/msg00581.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=87602661419259&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7244.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh42-errata-general.html#db","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1331","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"netcfg 2.16-1 in Red Hat Linux 4.2 allows the Ethernet interface to be controlled by users on reboot when an option is set, which allows local users to cause a denial of service by shutting down the interface."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"}]}]}],"references":[{"url":"http://www.iss.net/security_center/static/7245.php","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh42-errata-general.html#netcfg","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7245.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh42-errata-general.html#netcfg","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1332","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"gzexe in the gzip package on Red Hat Linux 5.0 and earlier allows local users to overwrite files of other users via a symlink attack on a temporary file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0","matchCriteriaId":"040166C7-CB3A-485E-9337-CB679B779BF8"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88603844115233&w=2","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2003/dsa-308","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7241.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3812","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#gzip","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/7845","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88603844115233&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2003/dsa-308","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7241.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3812","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#gzip","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/7845","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1333","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"automatic download option in ncftp 2.4.2 FTP client in Red Hat Linux 5.0 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in the names of files that are to be downloaded."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","versionEndIncluding":"5.0","matchCriteriaId":"040166C7-CB3A-485E-9337-CB679B779BF8"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=89042322924057&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7240.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6111","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#ncftp","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=89042322924057&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7240.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6111","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#ncftp","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1334","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple buffer overflows in filter command in Elm 2.4 allows attackers to execute arbitrary commands via (1) long From: headers, (2) long Reply-To: headers, or (3) via a long -f (filterfile) command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:elm_development_group:elm:2.4:*:*:*:*:*:*:*","matchCriteriaId":"5265C254-5FB6-4238-BD28-4176C70A29F4"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88609666024181&w=2","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#elm","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88609666024181&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#elm","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1335","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"snmpd server in cmu-snmp SNMP package before 3.3-1 in Red Hat Linux 4.0 is configured to allow remote attackers to read and write sensitive information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"FCFC97A3-14D7-4B17-AB49-1A395A11CF64"}]}]}],"references":[{"url":"http://www.redhat.com/support/errata/rh40-errata-general.html#cmu-snmp","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7251","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/rh40-errata-general.html#cmu-snmp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7251","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1339","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability when Network Address Translation (NAT) is enabled in Linux 2.2.10 and earlier with ipchains, or FreeBSD 3.2 with ipfw, allows remote attackers to cause a denial of service (kernel panic) via a ping -R (record route) command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.10","matchCriteriaId":"45204613-D254-43D9-9261-EFC4DDD8576E"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93277426802802&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93277766505061&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7257.php","source":"cve@mitre.org"},{"url":"http://www.kernel.org/pub/linux/kernel/v2.2/patch-2.2.11.gz","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6105","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93277426802802&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93277766505061&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7257.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kernel.org/pub/linux/kernel/v2.2/patch-2.2.11.gz","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6105","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1355","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BMC Patrol component, when installed with Compaq Insight Management Agent 4.23 and earlier, or Management Agents for Servers 4.40 and earlier, creates a PFCUser account with a default password and potentially dangerous privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:compaq:insight_management_agent:*:*:*:*:*:*:*:*","versionEndIncluding":"4.20","matchCriteriaId":"1185A4ED-A75A-413C-9D79-91E154A1EE40"},{"vulnerable":true,"criteria":"cpe:2.3:a:compaq:management_agents_for_servers:*:*:*:*:*:*:*:*","versionEndIncluding":"4.40","matchCriteriaId":"6EE31BED-8CFD-4F36-8A47-20C3E440A1ED"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=93542118727732&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93654336516711&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93759822430801&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=94183795025294&w=2","source":"cve@mitre.org"},{"url":"http://www.compaq.com/products/servers/management/advisory.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3231","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=93542118727732&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93654336516711&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=93759822430801&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=94183795025294&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.compaq.com/products/servers/management/advisory.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3231","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1358","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When an administrator in Windows NT or Windows 2000 changes a user policy, the policy is not properly updated if the local ntconfig.pol is not writable by the user, which could allow local users to bypass restrictions that would otherwise be enforced by the policy, possibly by changing the policy file to be read-only."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q157/6/73.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7400.php","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q157/6/73.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7400.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1359","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When the Ntconfig.pol file is used on a server whose name is longer than 13 characters, Windows NT does not properly enforce policies for global groups, which could allow users to bypass restrictions that were intended by those policies."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","matchCriteriaId":"ED27882B-A02A-4D5F-9117-A47976C676E0"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q163/8/75.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7401.php","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q163/8/75.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7401.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1360","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 allows local users to cause a denial of service via a user mode application that closes a handle that was opened in kernel mode, which causes a crash when the kernel attempts to close the handle."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q160/6/50.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7402.php","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q160/6/50.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7402.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1362","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Win32k.sys in Windows NT 4.0 before SP2 allows local users to cause a denial of service (crash) by calling certain WIN32K functions with incorrect parameters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"2DA4F4D4-444B-4CD8-A6E6-159303786DF8"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q160/6/01.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7403.php","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q160/6/01.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7403.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1363","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 3.51 and 4.0 allow local users to cause a denial of service (crash) by running a program that creates a large number of locks on a file, which exhausts the NonPagedPool."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D0D4EAC2-A948-461F-B5DD-0AE73CF05D29"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q163/1/43.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7405.php","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q163/1/43.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7405.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1364","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT 4.0 allows local users to cause a denial of service (crash) via an illegal kernel mode address to the functions (1) GetThreadContext or (2) SetThreadContext."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q142/6/53.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7421.php","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q142/6/53.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7421.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1379","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DNS allows remote attackers to use DNS name servers as traffic amplifiers via a UDP DNS query with a spoofed source address, which produces more traffic to the victim than was sent by the attacker."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dnstools_software:dnstools:*:*:*:*:*:*:*:*","matchCriteriaId":"B73D2BE6-5D5F-49E3-8737-43923A78FFF6"}]}]}],"references":[{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-063.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93348057829957&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93433758607623&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/7238.php","source":"cve@mitre.org"},{"url":"ftp://ftp.auscert.org.au/pub/auscert/advisory/AL-1999.004.dns_dos","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-063.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=93348057829957&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=93433758607623&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/7238.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1382","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetWare NFS mode 1 and 2 implements the \"Read Only\" flag in Unix by changing the ownership of a file to root, which allows local users to gain root privileges by creating a setuid program and setting it to \"Read Only,\" which NetWare-NFS changes to a setuid root program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:*:*:*:*:*:*:*:*","matchCriteriaId":"BF45C68A-5F83-4090-A0C1-A09EC2987706"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88427711321769&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=90295697702474&w=2","source":"cve@mitre.org"},{"url":"http://support.novell.com/cgi-bin/search/tidfinder.cgi?2940551","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7246.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=88427711321769&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=90295697702474&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.novell.com/cgi-bin/search/tidfinder.cgi?2940551","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7246.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1386","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Perl 5.004_04 and earlier follows symbolic links when running with the -e option, which allows local users to overwrite arbitrary files via a symlink attack on the /tmp/perl-eaXXXXX file."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*","versionEndIncluding":"5.004_04","matchCriteriaId":"356EEFF0-DC56-4E12-B7B1-DB28784FF3B1"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=88932165406213&w=2","source":"cve@mitre.org","tags":["Exploit","Mailing List"]},{"url":"http://www.iss.net/security_center/static/7243.php","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#perl","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://marc.info/?l=bugtraq&m=88932165406213&w=2","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Mailing List"]},{"url":"http://www.iss.net/security_center/static/7243.php","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.redhat.com/support/errata/rh50-errata-general.html#perl","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]}]}},{"cve":{"id":"CVE-1999-1444","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"genkey utility in Alibaba 2.0 generates RSA key pairs with an exponent of 1, which results in transactions that are sent in cleartext."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:computer_software_manufaktur:alibaba:2.0:*:*:*:*:*:*:*","matchCriteriaId":"8DD3CBF4-B593-4C4A-8B9C-D005846B4090"}]}]}],"references":[{"url":"http://catless.ncl.ac.uk/Risks/20.41.html#subj4","source":"cve@mitre.org"},{"url":"http://catless.ncl.ac.uk/Risks/20.41.html#subj4","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1451","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Winmsdp.exe sample file in IIS 4.0 and Site Server 3.0 allows remote attackers to read arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q231/3/68.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3271","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q231/3/68.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-013","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3271","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1452","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=91788829326419&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91764169410814&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=91822011021558&w=2","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q214/8/02.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/198","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1975","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=91788829326419&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=91764169410814&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=91822011021558&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/q214/8/02.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/198","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1975","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1455","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RSH service utility RSHSVC in Windows NT 3.5 through 4.0 does not properly restrict access as specified in the .Rhosts file when a user comes from an authorized host, which could allow unauthorized users to access the service by logging in from an authorized host."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*","versionEndIncluding":"4.0","matchCriteriaId":"2DA4F4D4-444B-4CD8-A6E6-159303786DF8"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q158/3/20.asp","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7422","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q158/3/20.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7422","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1456","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"thttpd HTTP server 2.03 and earlier allows remote attackers to read arbitrary files via a GET request with more than one leading / (slash) character in the filename."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:thttpd:thttpd_http_server:*:*:*:*:*:*:*:*","versionEndIncluding":"2.03","matchCriteriaId":"522B451F-0400-4980-A49A-252684241AFF"}]}]}],"references":[{"url":"http://www.acme.com/software/thttpd/thttpd.html#releasenotes","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/10368","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1809","source":"cve@mitre.org"},{"url":"http://www.acme.com/software/thttpd/thttpd.html#releasenotes","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/10368","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1809","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1462","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in bb-hist.sh CGI History module in Big Brother 1.09b and 1.09c allows remote attackers to read portions of arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bb4:big_brother:1.09b:*:*:*:*:*:*:*","matchCriteriaId":"A831C799-303E-487E-A7E3-67308E8ECEBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:bb4:big_brother:1.09c:*:*:*:*:*:*:*","matchCriteriaId":"76561DA2-6188-476B-B4FF-46EF49F36EDA"}]}]}],"references":[{"url":"http://bb4.com/README.CHANGES","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/archive/1/13440","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/142","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3755","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://bb4.com/README.CHANGES","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/archive/1/13440","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/142","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3755","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-1999-1464","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Cisco IOS 11.1CC and 11.1CT with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled interface to an interface that does not have DFS enabled, as described by Cisco bug CSCdk35564."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1cc:*:*:*:*:*:*:*","matchCriteriaId":"D5F31EAA-F76F-4182-B90D-6997E52EEB25"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1ct:*:*:*:*:*:*:*","matchCriteriaId":"8D419BED-A8C0-4304-A0E9-7805CE3E7FB1"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/j-016.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/iosdfsacl-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1401","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-016.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/iosdfsacl-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1401","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1465","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in Cisco IOS 11.1 through 11.3 with distributed fast switching (DFS) enabled allows remote attackers to bypass certain access control lists when the router switches traffic from a DFS-enabled input interface to an output interface with a logical subinterface, as described by Cisco bug CSCdk43862."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*","versionEndIncluding":"11.3","matchCriteriaId":"2C53A003-5CF4-4657-A6DB-8A08489D11B6"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/j-016.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/iosdfsacl-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1401","source":"cve@mitre.org"},{"url":"http://ciac.llnl.gov/ciac/bulletins/j-016.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cisco.com/warp/public/770/iosdfsacl-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/1401","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1472","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.0 allows remote attackers to read arbitrary text and HTML files on the user's machine via a small IFRAME that uses Dynamic HTML (DHTML) to send the data to the attacker, aka the Freiburg text-viewing issue."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=87710897923098&w=2","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://support.microsoft.com/support/kb/articles/q176/7/94.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.insecure.org/sploits/Internet_explorer_4.0.hack.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.microsoft.com/Windows/ie/security/freiburg.asp","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7819","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/587","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=87710897923098&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://support.microsoft.com/support/kb/articles/q176/7/94.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.insecure.org/sploits/Internet_explorer_4.0.hack.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.microsoft.com/Windows/ie/security/freiburg.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/7819","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/587","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1473","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When a Web site redirects the browser to another site, Internet Explorer 3.02 and 4.0 automatically resends authentication information to the second site, aka the \"Page Redirect Issue.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"943D5C5C-FC49-4EDE-AE75-A79CFF42208E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7426.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7818","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7426.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/7818","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1474","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PowerPoint 95 and 97 allows remote attackers to cause an application to be run automatically without prompting the user, possibly through the slide show, when the document is opened in browsers such as Internet Explorer."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:95:*:*:*:*:*:*:*","matchCriteriaId":"54CAE34D-7010-411D-94CB-25D2F0F99BFC"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:97:*:*:*:*:*:*:*","matchCriteriaId":"3FFA2986-0E47-43C0-938E-65FC15F13C53"}]}]}],"references":[{"url":"http://www.microsoft.com/windows/ie/security/powerpoint.asp","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/179","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/windows/ie/security/powerpoint.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/179","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1476","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A bug in Intel Pentium processor (MMX and Overdrive) allows local users to cause a denial of service (hang) in Intel-based operating systems such as Windows NT and Windows 95, via an invalid instruction, aka the \"Invalid Operand with Locked CMPXCHG8B Instruction\" problem."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:intel:pentium:*:*:mmx:*:*:*:*:*","matchCriteriaId":"130477DF-BB29-4E6F-B664-02AF0D8A5BA7"},{"vulnerable":true,"criteria":"cpe:2.3:h:intel:pentuim:*:*:overdrive:*:*:*:*:*","matchCriteriaId":"724A4E98-8650-4449-A54F-0882D5CC8D15"}]}]}],"references":[{"url":"http://support.microsoft.com/support/kb/articles/q163/8/52.asp","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/704","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q163/8/52.asp","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/704","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1481","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Squid 2.2.STABLE5 and below, when using external authentication, allows attackers to bypass access controls via a newline in the user/password pair."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:national_science_foundation:squid_web_proxy:1.0:*:*:*:*:*:*:*","matchCriteriaId":"907DE399-6B3B-4A6F-AFDD-5BE5FD6E5E57"},{"vulnerable":true,"criteria":"cpe:2.3:a:national_science_foundation:squid_web_proxy:1.0novm:*:*:*:*:*:*:*","matchCriteriaId":"391B1569-3599-40E1-91AF-928101723AF7"},{"vulnerable":true,"criteria":"cpe:2.3:a:national_science_foundation:squid_web_proxy:1.1:*:*:*:*:*:*:*","matchCriteriaId":"3C80314B-A472-416A-8B7C-E4A240A9ADCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:national_science_foundation:squid_web_proxy:2.1:*:*:*:*:*:*:*","matchCriteriaId":"100F1BA1-3278-4917-9C42-80CEAE72CDB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:national_science_foundation:squid_web_proxy:2.2:*:*:*:*:*:*:*","matchCriteriaId":"7676D506-ED4C-4A3B-8CA7-B0E5D9B3156E"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/33295","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/741","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.squid-cache.org/Versions/v2/2.2/bugs/","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3433","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/33295","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/741","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.squid-cache.org/Versions/v2/2.2/bugs/","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3433","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1488","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"sdrd daemon in IBM SP2 System Data Repository (SDR) allows remote attackers to read files without authentication."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:system_data_repository:sp_2.0:*:*:*:*:*:*:*","matchCriteriaId":"70B63CEB-0F9E-407C-AB16-2B05D983CA9B"}]}]}],"references":[{"url":"http://ciac.llnl.gov/ciac/bulletins/i-079a.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7217.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/371","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://ciac.llnl.gov/ciac/bulletins/i-079a.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.iss.net/security_center/static/7217.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/371","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1512","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The AMaViS virus scanner 0.2.0-pre4 and earlier allows remote attackers to execute arbitrary commands as root via an infected mail message with shell metacharacters in the reply-to field."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:amavis:virus_scanner:*:*:*:*:*:*:*:*","versionEndIncluding":"0.2_pre4","matchCriteriaId":"D447C999-F49C-4981-8ED6-67CD7F752F91"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=93219846414732&w=2","source":"cve@mitre.org"},{"url":"http://www.amavis.org/ChangeLog.txt","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/527","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2349","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=93219846414732&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.amavis.org/ChangeLog.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/527","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/2349","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1584","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unknown vulnerability in (1) loadmodule, and (2) modload if modload is installed with setuid/setgid privileges, in SunOS 4.1.1 through 4.1.3c, and Open Windows 3.0, allows local users to gain root privileges via environment variables, a different vulnerability than CVE-1999-1586."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:openwindows:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EC47C0A0-8A56-4869-9063-D48DBA3FEABC"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"}]}]}],"references":[{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-22-00124-1","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1993-18.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-22-00124-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.cert.org/advisories/CA-1993-18.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]}]}},{"cve":{"id":"CVE-1999-1585","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The (1) rcS and (2) mountall programs in Sun Solaris 2.x, possibly before 2.4, start a privileged shell on the system console if fsck fails while the system is booting, which allows attackers with physical access to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"C1370216-93EB-400F-9AA6-CB2DC316DAA7"}]}]}],"references":[{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-22-00124-1","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-22-00124-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1586","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"loadmodule in SunOS 4.1.x, as used by xnews, does not properly sanitize its environment, which allows local users to gain privileges, a different vulnerability than CVE-1999-1584."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"92B19A06-832D-4974-9D08-2CE787228592"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"E3A07C67-66FB-4ECF-BECB-C2BE72A80F3B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"615FA6E4-4DE0-422A-9220-F747D95192C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:4.1.3c:*:*:*:*:*:*:*","matchCriteriaId":"915D5897-B5FF-4F26-936E-9BAEF2604A86"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1995-12.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/g-02.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/498","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-1995-12.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.ciac.org/ciac/bulletins/g-02.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/498","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1587","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"/usr/ucb/ps in Sun Microsystems Solaris 8 and 9, and certain earlier releases, allows local users to view the environment variables and values of arbitrary processes via the -e option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*","matchCriteriaId":"A711CDC2-412C-499D-9FA6-7F25B06267C6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","matchCriteriaId":"A2475113-CFE4-41C8-A86F-F2DA6548D224"}]}]}],"references":[{"url":"http://secunia.com/advisories/19426","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://securitytracker.com/id?1015833","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102215-1","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://www.osvdb.org/24200","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/19662","source":"cve@mitre.org"},{"url":"http://www.sunmanagers.org/archives/1996/1383.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2006/1123","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25460","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1470","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/19426","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://securitytracker.com/id?1015833","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-26-102215-1","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]},{"url":"http://www.osvdb.org/24200","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/19662","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.sunmanagers.org/archives/1996/1383.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.vupen.com/english/advisories/2006/1123","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/25460","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1470","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1588","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in nlps_server in Sun Solaris x86 2.4, 2.5, and 2.5.1 allows remote attackers to execute arbitrary code as root via a long string beginning with \"NLPS:002:002:\" to the listen (aka System V listener) port, TCP port 2766."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"}]}]}],"references":[{"url":"http://lsd-pl.net/files/get?SOLARIS/solx86_nlps_server","source":"cve@mitre.org"},{"url":"http://security-protocols.com/sploits/unsorted_exploits/nlps_server.c","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/2319","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/data/vulnerabilities/exploits/nlps_server.c","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://lsd-pl.net/files/get?SOLARIS/solx86_nlps_server","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://security-protocols.com/sploits/unsorted_exploits/nlps_server.c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/2319","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/data/vulnerabilities/exploits/nlps_server.c","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]}]}},{"cve":{"id":"CVE-1999-1589","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unspecified vulnerability in crontab in IBM AIX 3.2 allows local users to gain root privileges via unknown attack vectors."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-noinfo"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"73CE931A-1500-4450-B65A-591CAA3225AB"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:1.3:*:*:*:*:*:*:*","matchCriteriaId":"5F40A32B-3EF8-41D4-B6EC-3DC82D550365"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"28B1C99E-D05A-4778-8650-39B63CC8B2F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*","matchCriteriaId":"CE321D29-3312-4F22-B930-1B119DA4BD27"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-1992-10.html","source":"cve@mitre.org","tags":["Patch","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/357","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.cert.org/advisories/CA-1992-10.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/357","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}},{"cve":{"id":"CVE-1999-1590","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Directory traversal vulnerability in Muhammad A. Muquit wwwcount (Count.cgi) 2.3 allows remote attackers to read arbitrary GIF files via \"..\" sequences in the image parameter, a different vulnerability than CVE-1999-0021."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:S/C:P/I:N/A:N","baseScore":3.5,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":6.8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wwwcount:wwwcount:2.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D184E2-F799-4274-A7DE-4770CA359C80"}]}]}],"references":[{"url":"http://seclists.org/bugtraq/1997/Oct/0058.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://seclists.org/bugtraq/1997/Oct/0058.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-1999-1591","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Internet Information Services (IIS) server 4.0 SP4, without certain hotfixes released for SP4, does not require authentication credentials under certain conditions, which allows remote attackers to bypass authentication requirements, as demonstrated by connecting via Microsoft Visual InterDev 6.0."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"B10C80B4-4C21-4D91-9A74-B78B6BF9D374"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_interdev:6.0:*:*:*:*:*:*:*","matchCriteriaId":"394EC852-89B9-4246-86DB-D27A38ED29F5"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00276.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00277.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/190","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00276.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/1998-1999/msg00277.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/190","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1592","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact.  NOTE: this might overlap CVE-1999-0129."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*","matchCriteriaId":"FD1BA107-F2D3-4F13-82EC-4576C429E3C1"},{"vulnerable":false,"criteria":"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"1070749A-65E9-439A-A7CC-3CE529A5D5E7"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sendmail:sendmail:5:*:*:*:*:*:*:*","matchCriteriaId":"7AFADCBA-DB24-451F-9E1D-FBBEE41C5D52"}]}]}],"references":[{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/243","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/243","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]}]}},{"cve":{"id":"CVE-2000-0011","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in AnalogX SimpleServer:WWW HTTP server allows remote attackers to execute commands via a long GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:analogx:simpleserver_www:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"79C629DD-3F9B-4824-A13C-85B2BDFDF557"}]}]}],"references":[{"url":"http://www.analogx.com/contents/download/network/sswww.htm","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1184","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/906","source":"cve@mitre.org"},{"url":"http://www.analogx.com/contents/download/network/sswww.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1184","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/906","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0013","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IRIX soundplayer program allows local users to gain privileges by including shell metacharacters in a .wav file, which is executed via the midikeys program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/909","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/909","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0015","sourceIdentifier":"cve@mitre.org","published":"1999-12-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CascadeView TFTP server allows local users to gain privileges via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ascend:cascadeview_ux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"FBDA4DDC-9DA4-4815-835A-8FFB293AABD2"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/910","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/910","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0964","sourceIdentifier":"cve@mitre.org","published":"2000-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in FreeBSD setlocale in the libc module allows attackers to execute arbitrary code via a long PATH_LOCALE environment variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"}]}]}],"references":[{"url":"http://www.osvdb.org/6086","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6086","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0069","sourceIdentifier":"cve@mitre.org","published":"2000-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The recover program in Solstice Backup allows local users to restore sensitive files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solstice_backup:5.1:*:*:*:*:*:*:*","matchCriteriaId":"7A1F23BD-2517-4074-8DD6-7EC24A4F402C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0069","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0069","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0120","sourceIdentifier":"cve@mitre.org","published":"2000-01-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Remote Access Service invoke.cfm template in Allaire Spectra 1.0 allows users to bypass authentication via the bAuthenticated parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:spectra:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C7218A9E-7AA1-4536-967B-72B37B03C9C5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/955","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4025","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/955","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4025","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0077","sourceIdentifier":"cve@mitre.org","published":"2000-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The October 1998 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the ps and grep commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*","matchCriteriaId":"87FB80D8-1BE7-46F7-9F7E-B7DA88D039F8"}]}]}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5549","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5549","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0078","sourceIdentifier":"cve@mitre.org","published":"2000-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The June 1999 version of the HP-UX aserver program allows local users to gain privileges by specifying an alternate PATH which aserver uses to find the awk command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*","matchCriteriaId":"87FB80D8-1BE7-46F7-9F7E-B7DA88D039F8"}]}]}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5728","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5728","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0082","sourceIdentifier":"cve@mitre.org","published":"2000-01-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WebTV email client allows remote attackers to force the client to send email without the user's knowledge via HTML."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:webtv:*:*:*:*:*:*:*:*","matchCriteriaId":"3BB38E8E-B3B2-4C2F-84E7-D52BFD5E9236"}]}]}],"references":[{"url":"http://net4tv.com/voice/story.cfm?StoryID=1823","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.wired.com/news/technology/0%2C1282%2C33420%2C00.html","source":"cve@mitre.org"},{"url":"http://net4tv.com/voice/story.cfm?StoryID=1823","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.wired.com/news/technology/0%2C1282%2C33420%2C00.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0735","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"KDE K-Mail allows local users to gain privileges via a symlink attack in temporary user directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:kde:k-mail:*:*:*:*:*:*:*:*","versionEndIncluding":"1.1","matchCriteriaId":"66BF3084-39C8-4608-9EF4-207B69ADBF76"}]}]}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA1999015_01.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/300","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://www.redhat.com/support/errata/RHSA1999015_01.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/300","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]}]}},{"cve":{"id":"CVE-1999-0744","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Netscape Enterprise Server and FastTrask Server allows remote attackers to gain privileges via a long HTTP GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:*:*:*:*:*:*:*:*","matchCriteriaId":"EF437206-7696-4583-A6DC-A622F02001EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:fasttrack_server:*:*:*:*:*:*:*:*","matchCriteriaId":"6BBB1D15-C680-460B-BCCB-8E15C1F24AD5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/603","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/603","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0876","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Internet Explorer 4.0 via EMBED tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":true,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-119"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:3.0:*:mac_os:*:*:*:*:*","matchCriteriaId":"2277E59E-D981-4D9D-8FC0-F124FB8B9C5B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:3.1:*:mac_os:*:*:*:*:*","matchCriteriaId":"C6CB69E1-189F-425C-9023-DE2741669507"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0:a:*:*:*:*:*:*","matchCriteriaId":"EB817B2B-6F65-4989-9177-153518F32894"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*","matchCriteriaId":"44FF4E47-AD75-42C7-BB84-42BBA46A58B2"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ185959","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ185959","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.microsoft.com/support/kb/articles/q176/6/97.asp","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0894","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Red Hat Linux screen program does not use Unix98 ptys, allowing local users to write to other terminals."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:*:*:*:*:*:*:*:*","matchCriteriaId":"B133DAC8-2B0D-4F83-9025-AD071740187A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0894","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0894","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0049","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Winamp client allows remote attackers to execute commands via a long entry in a .pls file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nullsoft:winamp:2.0:*:*:*:*:*:*:*","matchCriteriaId":"CAFFD8E7-A443-4131-9CFB-67AA9739E6E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:nullsoft:winamp:2.10:*:*:*:*:*:*:*","matchCriteriaId":"6E0581F9-9B99-43F6-852E-BD28BB47B169"}]}]}],"references":[{"url":"http://www.osvdb.org/12022","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/925","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/12022","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/925","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0050","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Allaire Spectra Webtop allows authenticated users to access other Webtop sections by specifying explicit URLs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:spectra:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C7218A9E-7AA1-4536-967B-72B37B03C9C5"}]}]}],"references":[{"url":"http://www.allaire.com/handlers/index.cfm?ID=13976&Method=Full","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/915","source":"cve@mitre.org"},{"url":"http://www.allaire.com/handlers/index.cfm?ID=13976&Method=Full","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/915","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0051","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Allaire Spectra Configuration Wizard allows remote attackers to cause a denial of service by repeatedly resubmitting data collections for indexing via a URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:spectra:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C7218A9E-7AA1-4536-967B-72B37B03C9C5"}]}]}],"references":[{"url":"http://www.allaire.com/handlers/index.cfm?ID=13977&Method=Full","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/916","source":"cve@mitre.org"},{"url":"http://www.allaire.com/handlers/index.cfm?ID=13977&Method=Full","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/916","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0052","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Red Hat userhelper program in the usermode package allows local users to gain root access via PAM and a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"D323A6B7-2741-4F31-B0D6-5D6FB738A2A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACAAD334-2CA7-4B3B-BA25-302E7610BC2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*","matchCriteriaId":"667CF388-298D-4B64-9BA5-89D153FFA998"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"F7C765FF-0A3D-4BF4-B236-609658776ACA"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"C6619B49-8A89-4600-A47F-A39C8BF54259"}]}]}],"references":[{"url":"http://www.l0pht.com/advisories/pam_advisory","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-001.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/913","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/search.php3?type=2&pattern=linux-pam-userhelper","source":"cve@mitre.org"},{"url":"http://www.l0pht.com/advisories/pam_advisory","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-001.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/913","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/search.php3?type=2&pattern=linux-pam-userhelper","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0053","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Commercial Internet System (MCIS) IMAP server allows remote attackers to cause a denial of service via a malformed IMAP request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.0:*:*:*:*:*:*:*","matchCriteriaId":"81514AB5-388D-4D13-B63A-C237A502B86A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.5:*:*:*:*:*:*:*","matchCriteriaId":"879AFDCC-B9D8-41EF-85DD-70CC1BD5227C"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246731","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/912","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-001","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246731","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/912","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-001","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0057","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cold Fusion CFCACHE tag places temporary cache files within the web document root, allowing remote attackers to obtain sensitive system information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C334CA02-D4EC-40D0-B75F-AFBC0F3903E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3630623B-468C-4E71-9C57-EFF83E5EFA4A"}]}]}],"references":[{"url":"http://www.allaire.com/handlers/index.cfm?ID=13978&Method=Full","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/917","source":"cve@mitre.org"},{"url":"http://www.allaire.com/handlers/index.cfm?ID=13978&Method=Full","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/917","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0059","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PHP3 with safe_mode enabled does not properly filter shell metacharacters from commands that are executed by popen, which could allow remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0:*:*:*:*:*:*:*","matchCriteriaId":"245C601D-0FE7-47E3-8304-6FF45E9567D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"691BB8BB-329A-4640-B758-7590C99B5E42"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.2:*:*:*:*:*:*:*","matchCriteriaId":"E2BC4CCE-2774-463E-82EA-36CD442D3A7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"C478024C-2FCD-463F-A75E-E04660AA9DF1"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.4:*:*:*:*:*:*:*","matchCriteriaId":"AC9C32F4-5102-4E9B-9F32-B24B65A5ED2F"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.5:*:*:*:*:*:*:*","matchCriteriaId":"A5BD99C0-E875-496E-BE5E-A8DCBD414B5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.6:*:*:*:*:*:*:*","matchCriteriaId":"1851ADE5-C70C-46E0-941A-6ADF7DB5C126"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.7:*:*:*:*:*:*:*","matchCriteriaId":"69DA3BA2-AF53-4C9D-93FA-0317841595B1"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.8:*:*:*:*:*:*:*","matchCriteriaId":"FB0CFEE5-2274-4BBC-A24A-3A0D13F607FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.9:*:*:*:*:*:*:*","matchCriteriaId":"67B59D6A-7EDA-4C34-81D6-C2557C85D164"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.10:*:*:*:*:*:*:*","matchCriteriaId":"AEBA40B6-8FDF-41AA-8166-F491FF7F3118"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.11:*:*:*:*:*:*:*","matchCriteriaId":"E74E2B72-A428-4BB3-B6F8-0AF5E487A807"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.12:*:*:*:*:*:*:*","matchCriteriaId":"1E2F1D82-8E6A-4FBF-9055-A0F395DC17FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:php:php:3.0.13:*:*:*:*:*:*:*","matchCriteriaId":"945FF149-3446-4905-BCA1-C397E3497B58"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/911","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/911","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0062","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The DTML implementation in the Z Object Publishing Environment (Zope) allows remote attackers to conduct unauthorized activities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zope:zope:1.10.3:*:*:*:*:*:*:*","matchCriteriaId":"46B2B101-676C-4EF3-90FB-7B5D36D1ADF0"},{"vulnerable":true,"criteria":"cpe:2.3:a:zope:zope:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"6C49596F-E215-4B70-8397-3C247F509D43"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/922","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000104222219.B41650%40schvin.net","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/922","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000104222219.B41650%40schvin.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0085","sourceIdentifier":"cve@mitre.org","published":"2000-01-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute code via the LOWSRC or DYNRC parameters in the IMG tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:hotmail:*:*:*:*:*:*:*:*","matchCriteriaId":"4E5C1DBF-21AF-4A3E-8A4A-42CCD6DD40C3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0085","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0085","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0056","sourceIdentifier":"cve@mitre.org","published":"2000-01-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IMail IMONITOR status.cgi CGI script allows remote attackers to cause a denial of service with many calls to status.cgi."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.8:*:*:*:*:*:*:*","matchCriteriaId":"6E11FF5E-9B3D-4818-B091-1286ECF47937"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:*","matchCriteriaId":"9EADF489-0420-4C47-9F73-78114C2042F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*","matchCriteriaId":"EAEA8FB7-3D42-4A39-BCCD-2DE3BC3EAC19"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/914","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/914","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0058","sourceIdentifier":"cve@mitre.org","published":"2000-01-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Network HotSync program in Handspring Visor does not have authentication, which allows remote attackers to retrieve email and files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:handspring:visor_network_hotsync:1.0:*:*:*:*:*:*:*","matchCriteriaId":"BAEC17D8-DDC9-420A-8CC8-0FA1E2F19FCE"}]}]}],"references":[{"url":"http://www.security-express.com/archives/bugtraq/2000-01/0085.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/920","source":"cve@mitre.org"},{"url":"http://www.security-express.com/archives/bugtraq/2000-01/0085.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/920","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0044","sourceIdentifier":"cve@mitre.org","published":"2000-01-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Macros in War FTP 1.70 and 1.67b2 allow local or remote attackers to read arbitrary files or execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jgaa:warftpd:*:*:*:*:*:*:*:*","versionEndIncluding":"1.67b2","matchCriteriaId":"2FD852E0-64EB-404B-8930-37C50EBB4242"},{"vulnerable":true,"criteria":"cpe:2.3:a:jgaa:warftpd:1.70b:*:*:*:*:*:*:*","matchCriteriaId":"8751BED4-80DB-4819-8566-C7143B995825"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/919","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/919","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0055","sourceIdentifier":"cve@mitre.org","published":"2000-01-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris chkperm command allows local users to gain root access via a long -n option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*","matchCriteriaId":"1F881110-7B54-49DA-B23A-710273430C44"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*","matchCriteriaId":"200D8CB2-0D52-40A8-9CD9-6E4513605201"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*","matchCriteriaId":"54AF87E4-52A4-44CA-B48E-A5BB139E6410"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*","matchCriteriaId":"F66BAF35-A8B9-4E95-B270-444206FDD35B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*","matchCriteriaId":"C7A22D21-E0A9-4B56-86C7-805AD1A610D6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*","matchCriteriaId":"7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*","matchCriteriaId":"5B72953B-E873-4E44-A3CF-12D770A0D416"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*","matchCriteriaId":"39F847DB-65A9-47DA-BCFA-A179E5E2301A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/918","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/918","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0084","sourceIdentifier":"cve@mitre.org","published":"2000-01-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CuteFTP uses weak encryption to store password information in its tree.dat file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:globalscape:cuteftp:*:*:*:*:*:*:*:*","versionEndIncluding":"2.x","matchCriteriaId":"12F2BB52-BA26-407A-AFCF-52B134BB9AB3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0084","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0084","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0061","sourceIdentifier":"cve@mitre.org","published":"2000-01-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5 does not modify the security zone for a document that is being loaded into a window until after the document has been loaded, which could allow remote attackers to execute Javascript in a different security context while the document is loading."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*","matchCriteriaId":"6219D36E-9E2C-4DC7-8FD5-FAD144A333F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.5:preview:*:*:*:*:*:*","matchCriteriaId":"8E93C22E-812E-4CDA-9850-2386CE1E817A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/923","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/923","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-1220","sourceIdentifier":"cve@mitre.org","published":"2000-01-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The line printer daemon (lpd) in the lpr package in multiple Linux operating systems allows local users to gain root privileges by causing sendmail to execute with arbitrary command line arguments, as demonstrated using the -C option to specify a configuration file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"36B60E50-4F5A-4404-BEA3-C94F7D27B156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*","matchCriteriaId":"6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*","matchCriteriaId":"440B7208-34DB-4898-8461-4E703F7EDFB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*","matchCriteriaId":"5663579C-3AD2-4E5B-A595-C8DB984F9C26"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*","matchCriteriaId":"D07AA144-6FD7-4C80-B4F2-D21C1AFC864A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*","matchCriteriaId":"29113D8E-9618-4A0E-9157-678332082858"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*","matchCriteriaId":"313613E9-4837-433C-90EE-84A92E8D24E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*","matchCriteriaId":"41AA1290-5039-406F-B195-3A4C018202D3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*","matchCriteriaId":"60CC9410-F6B8-4748-B76F-30626279028E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*","matchCriteriaId":"DCC67401-C85A-4E4E-AE61-85FEBBF4346B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*","matchCriteriaId":"1C4427AC-07C1-4765-981B-B5D86D698C2D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*","matchCriteriaId":"63EF0CEE-74A9-45C8-8AFD-77815230ACC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*","matchCriteriaId":"A7B59E7C-B059-41CD-AE33-E9623ADA12BC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*","matchCriteriaId":"0DF1B657-C910-4BB0-828C-09B6A59D988D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*","matchCriteriaId":"72D61A9F-AC57-4DD9-9047-74BFA9BFACFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*","matchCriteriaId":"C254FC5D-895D-4EFC-B9A7-74699D9FE65E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*","matchCriteriaId":"27532639-37CD-4BD2-AE48-F741009D3449"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*","matchCriteriaId":"F83879DE-1BD7-4FF7-ACC6-5B119DB09BF9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*","matchCriteriaId":"EED22734-8AAC-4897-BB71-438E19B8A005"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*","matchCriteriaId":"FEA9C28F-18E6-4199-9740-FAB00563EBF7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*","matchCriteriaId":"C6E63313-9533-478D-ACC0-C050FBA3EACF"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*","matchCriteriaId":"EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P","source":"cve@mitre.org"},{"url":"http://seclists.org/lists/bugtraq/2000/Jan/0116.html","source":"cve@mitre.org"},{"url":"http://www.atstake.com/research/advisories/2000/lpd_advisory.txt","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2000/20000109","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/39001","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.l0pht.com/advisories/lpd_advisory","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-002.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/927","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3841","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://seclists.org/lists/bugtraq/2000/Jan/0116.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.atstake.com/research/advisories/2000/lpd_advisory.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2000/20000109","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.kb.cert.org/vuls/id/39001","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.l0pht.com/advisories/lpd_advisory","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/927","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3841","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-1221","sourceIdentifier":"cve@mitre.org","published":"2000-01-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The line printer daemon (lpd) in the lpr package in multiple Linux operating systems authenticates by comparing the reverse-resolved hostname of the local machine to the hostname of the print server as returned by gethostname, which allows remote attackers to bypass intended access controls by modifying the DNS for the attacking IP."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"36B60E50-4F5A-4404-BEA3-C94F7D27B156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.2:*:*:*:*:*:*:*","matchCriteriaId":"6ECB750B-9F53-4DB6-8B26-71BCCA446FF7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*","matchCriteriaId":"440B7208-34DB-4898-8461-4E703F7EDFB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.5:*:*:*:*:*:*:*","matchCriteriaId":"5663579C-3AD2-4E5B-A595-C8DB984F9C26"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*","matchCriteriaId":"D07AA144-6FD7-4C80-B4F2-D21C1AFC864A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*","matchCriteriaId":"29113D8E-9618-4A0E-9157-678332082858"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.8:*:*:*:*:*:*:*","matchCriteriaId":"313613E9-4837-433C-90EE-84A92E8D24E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.9:*:*:*:*:*:*:*","matchCriteriaId":"41AA1290-5039-406F-B195-3A4C018202D3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.10:*:*:*:*:*:*:*","matchCriteriaId":"60CC9410-F6B8-4748-B76F-30626279028E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.11:*:*:*:*:*:*:*","matchCriteriaId":"DCC67401-C85A-4E4E-AE61-85FEBBF4346B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.12:*:*:*:*:*:*:*","matchCriteriaId":"1C4427AC-07C1-4765-981B-B5D86D698C2D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.13:*:*:*:*:*:*:*","matchCriteriaId":"63EF0CEE-74A9-45C8-8AFD-77815230ACC6"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.14f:*:*:*:*:*:*:*","matchCriteriaId":"A7B59E7C-B059-41CD-AE33-E9623ADA12BC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.14m:*:*:*:*:*:*:*","matchCriteriaId":"0DF1B657-C910-4BB0-828C-09B6A59D988D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.15f:*:*:*:*:*:*:*","matchCriteriaId":"72D61A9F-AC57-4DD9-9047-74BFA9BFACFC"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.15m:*:*:*:*:*:*:*","matchCriteriaId":"C254FC5D-895D-4EFC-B9A7-74699D9FE65E"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.16f:*:*:*:*:*:*:*","matchCriteriaId":"27532639-37CD-4BD2-AE48-F741009D3449"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.16m:*:*:*:*:*:*:*","matchCriteriaId":"F83879DE-1BD7-4FF7-ACC6-5B119DB09BF9"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*","matchCriteriaId":"EED22734-8AAC-4897-BB71-438E19B8A005"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*","matchCriteriaId":"FEA9C28F-18E6-4199-9740-FAB00563EBF7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*","matchCriteriaId":"C6E63313-9533-478D-ACC0-C050FBA3EACF"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*","matchCriteriaId":"EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://rhn.redhat.com/errata/RHSA-2000-002.html","source":"cve@mitre.org"},{"url":"http://www.atstake.com/research/advisories/2000/lpd_advisory.txt","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2000/20000109","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.kb.cert.org/vuls/id/30308","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.l0pht.com/advisories/lpd_advisory","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/927","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3840","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20021104-01-P","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://rhn.redhat.com/errata/RHSA-2000-002.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.atstake.com/research/advisories/2000/lpd_advisory.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.debian.org/security/2000/20000109","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.kb.cert.org/vuls/id/30308","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.l0pht.com/advisories/lpd_advisory","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/927","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3840","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0046","sourceIdentifier":"cve@mitre.org","published":"2000-01-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ICQ 99b 1.1.1.1 client allows remote attackers to execute commands via a malformed URL within an ICQ message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:0.99b_1.1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"55BF15F6-FFF7-4A0D-A2FF-8160AB3D70C5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/929","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/929","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0080","sourceIdentifier":"cve@mitre.org","published":"2000-01-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AIX techlibss allows local users to overwrite files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94757136413681&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/931","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94757136413681&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/931","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0081","sourceIdentifier":"cve@mitre.org","published":"2000-01-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Hotmail does not properly filter JavaScript code from a user's mailbox, which allows a remote attacker to execute the code by using hexadecimal codes to specify the javascript: protocol, e.g. j&#x41;vascript."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:hotmail:*:*:*:*:*:*:*:*","matchCriteriaId":"4E5C1DBF-21AF-4A3E-8A4A-42CCD6DD40C3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0081","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0081","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0045","sourceIdentifier":"cve@mitre.org","published":"2000-01-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MySQL allows local users to modify passwords for arbitrary MySQL users via the GRANT privilege."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*","matchCriteriaId":"45AD5549-07DC-43DA-B277-D7BF16ABE4E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*","matchCriteriaId":"C30459B9-0FAC-48DF-9601-AAD1A028846F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*","matchCriteriaId":"18E35942-7E70-468E-BA15-97CA5086C1B3"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/926","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/926","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0067","sourceIdentifier":"cve@mitre.org","published":"2000-01-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CyberCash Merchant Connection Kit (MCK) allows local users to modify files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cybercash:merchant_connection_kit:3.2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"C02AF175-0F6C-4FEC-98C2-3B7F157BAA22"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0067","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0067","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0071","sourceIdentifier":"cve@mitre.org","published":"2000-01-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.0 allows a remote attacker to obtain the real pathname of the document root by requesting non-existent files with .ida or .idq extensions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94770020309953&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94780058006791&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94770020309953&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94780058006791&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0074","sourceIdentifier":"cve@mitre.org","published":"2000-01-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PowerScripts PlusMail CGI program allows remote attackers to execute commands via a password file with improper permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:powerscripts:plusmail:*:*:*:*:*:*:*:*","matchCriteriaId":"51607815-55E7-41B4-B167-FE29CA929971"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0074","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0074","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1002","sourceIdentifier":"cve@mitre.org","published":"2000-01-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Navigator uses weak encryption for storing a user's Netscape mail password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"38FD74F5-12ED-4049-B06F-0F22A0254C0F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94536309217214&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94570673523998&w=2","source":"cve@mitre.org"},{"url":"http://www.rstcorp.com/news/bad-crypto.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=94536309217214&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94570673523998&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.rstcorp.com/news/bad-crypto.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0048","sourceIdentifier":"cve@mitre.org","published":"2000-01-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"get_it program in Corel Linux Update allows local users to gain root access by specifying an alternate PATH for the cp program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:corel:linux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0CB5BDE6-F735-461F-B3B9-066A4876AB0A"}]}]}],"references":[{"url":"http://linux.corel.com/support/clos_patch1.htm","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/928","source":"cve@mitre.org"},{"url":"http://linux.corel.com/support/clos_patch1.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/928","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0070","sourceIdentifier":"cve@mitre.org","published":"2000-01-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NtImpersonateClientOfPort local procedure call in Windows NT 4.0 allows local users to gain privileges, aka \"Spoofed LPC Port Request.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*","matchCriteriaId":"B9236480-6450-42E1-B1FF-F336488A683A"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247869","source":"cve@mitre.org"},{"url":"http://www.bindview.com/security/advisory/adv_NtImpersonate.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/934","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/search.php3?type=2&pattern=nt-spoofed-lpc-port","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-003","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ247869","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.bindview.com/security/advisory/adv_NtImpersonate.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/934","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/search.php3?type=2&pattern=nt-spoofed-lpc-port","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-003","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0087","sourceIdentifier":"cve@mitre.org","published":"2000-01-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Mail Notification (nsnotify) utility in Netscape Communicator uses IMAP without SSL, even if the user has set a preference for Communicator to use an SSL connection, allowing a remote attacker to sniff usernames and passwords in plaintext."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"38FD74F5-12ED-4049-B06F-0F22A0254C0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:navigator:*:*:*:*:*:*:*:*","matchCriteriaId":"DA2CA2F8-260C-4559-BF24-3E321CEAE93F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94790377622943&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/4385.php","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94790377622943&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/4385.php","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0066","sourceIdentifier":"cve@mitre.org","published":"2000-01-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WebSite Pro allows remote attackers to determine the real pathname of webdirectories via a malformed URL request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:website_professional:2.3.18:*:*:*:*:*:*:*","matchCriteriaId":"C1D46829-3A28-49AC-9D19-7EFFAE6E55D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:oreilly:website_professional:2.4.9:*:*:*:*:*:*:*","matchCriteriaId":"356B3E87-68AD-41F9-A008-D93FFEF536E0"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0066","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0066","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0075","sourceIdentifier":"cve@mitre.org","published":"2000-01-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Super Mail Transfer Package (SMTP), later called MsgCore, has a memory leak which allows remote attackers to cause a denial of service by repeating multiple HELO, MAIL FROM, RCPT TO, and DATA commands in the same session."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nosque:msgcore:1.9:*:*:*:*:*:*:*","matchCriteriaId":"99F4B15E-DC33-4023-9C6B-302BAB1035B5"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/930","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/930","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0063","sourceIdentifier":"cve@mitre.org","published":"2000-01-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to read arbitrary files by specifying the filename in a parameter to the script."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:nortel:contivity:1.0:*:*:*:*:*:*:*","matchCriteriaId":"74A31F83-CBE4-4CCF-A482-3FA076D6EFA7"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/938","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/938","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0064","sourceIdentifier":"cve@mitre.org","published":"2000-01-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"cgiproc CGI script in Nortel Contivity HTTP server allows remote attackers to cause a denial of service via a malformed URL that includes shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:nortel:contivity:1.0:*:*:*:*:*:*:*","matchCriteriaId":"74A31F83-CBE4-4CCF-A482-3FA076D6EFA7"}]}]}],"references":[{"url":"http://www.osvdb.org/7583","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/938","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7583","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/938","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0065","sourceIdentifier":"cve@mitre.org","published":"2000-01-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in InetServ 3.0 allows remote attackers to execute commands via a long GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:avtronics:inetserv:3.0:*:*:*:*:*:*:*","matchCriteriaId":"24C3634B-FD67-441D-A0C9-C274B5DB4409"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0065","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0065","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0072","sourceIdentifier":"cve@mitre.org","published":"2000-01-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Visual Casel (Vcasel) does not properly prevent users from executing files, which allows local users to use a relative pathname to specify an alternate file which has an approved name and possibly gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:computer_power_solutions:visual_casel:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D74D20B7-F524-407D-A378-F60D27329939"},{"vulnerable":true,"criteria":"cpe:2.3:a:computer_power_solutions:visual_casel:3.5:*:*:*:*:*:*:*","matchCriteriaId":"2599A5C4-40C2-40FB-A5B1-99546AE56D56"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94823061421676&w=2","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/3867.php","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/937","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94823061421676&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/3867.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/937","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0090","sourceIdentifier":"cve@mitre.org","published":"2000-01-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"VMWare 1.1.2 allows local users to cause a denial of service via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:P","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"AFBF029A-103D-4BB6-B037-25EC2224DF34"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"D00C4D90-3697-4F3F-8FFF-FE63F3AD0DEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:1.1:*:*:*:*:*:*:*","matchCriteriaId":"29AA2B37-BF5F-4AC5-844D-34CF56EC621C"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"07131E56-53EE-4CE1-A135-050792EA3C1D"},{"vulnerable":true,"criteria":"cpe:2.3:a:vmware:workstation:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"86334051-8763-4CD9-9480-CAEAE756DFCA"}]}]}],"references":[{"url":"http://www.osvdb.org/1205","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/943","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1205","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/943","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0992","sourceIdentifier":"cve@mitre.org","published":"2000-01-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP VirtualVault with the PHSS_17692 patch allows unprivileged processes to bypass access restrictions via the Trusted Gateway Proxy (TGP)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:vvos:*:*:*:*:*:*:*:*","matchCriteriaId":"7AADED85-FA20-4D93-8921-A4933181ADF5"}]}]}],"references":[{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9912-107","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9912-107","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0079","sourceIdentifier":"cve@mitre.org","published":"2000-01-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The W3C CERN httpd HTTP server allows remote attackers to determine the real pathnames of some commands via a request for a nonexistent URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:w3c:cern_httpd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"D2681211-5D4C-4D59-9FA5-81D6F946572B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/936","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/936","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0086","sourceIdentifier":"cve@mitre.org","published":"2000-01-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netopia Timbuktu Pro sends user IDs and passwords in cleartext, which allows remote attackers to obtain them via sniffing."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netopia:timbuktu_pro:2.0:*:*:*:*:*:*:*","matchCriteriaId":"84DF8888-9F75-4C19-AC1D-96F401764997"},{"vulnerable":true,"criteria":"cpe:2.3:a:netopia:timbuktu_pro:3.0:*:*:*:*:*:*:*","matchCriteriaId":"FCF66FA3-74FC-49DB-BCF4-11E1D8339F57"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/935","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/935","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0099","sourceIdentifier":"cve@mitre.org","published":"2000-01-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in UnixWare ppptalk command allows local users to gain privileges via a long prompt argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.0:*:*:*:*:*:*:*","matchCriteriaId":"86A45194-7ACF-45EE-9542-D8CE3A204584"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.0:*:*:*:*:*:*:*","matchCriteriaId":"1D7893E4-7541-4B35-8C64-AD553C0A4B0F"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94848865112897&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94848865112897&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0092","sourceIdentifier":"cve@mitre.org","published":"2000-01-19T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The BSD make program allows local users to modify files via a symlink attack when the -j option is being used."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*","matchCriteriaId":"E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7"},{"vulnerable":true,"criteria":"cpe:2.3:o:openbsd:openbsd:2.6:*:*:*:*:*:*:*","matchCriteriaId":"0DF053A1-C252-427E-9EEF-27240F422976"}]}]}],"references":[{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/939","source":"cve@mitre.org"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:01.make.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/939","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0595","sourceIdentifier":"cve@mitre.org","published":"2000-01-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Windows NT system does not clear the system page file during shutdown, which might allow sensitive information to be recorded."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D0D4EAC2-A948-461F-B5DD-0AE73CF05D29"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/216","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/216","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0088","sourceIdentifier":"cve@mitre.org","published":"2000-01-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the conversion utilities for Japanese, Korean and Chinese Word 5 documents allows an attacker to execute commands, aka the \"Malformed Conversion Data\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:97:*:*:ja:*:*:*:*","matchCriteriaId":"0F00A805-2967-45B2-9721-B8745AAACDEE"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:97:*:*:ko:*:*:*:*","matchCriteriaId":"E3B19E1B-FA9E-4381-BBC0-8C1082F06FBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:97:*:*:zh:*:*:*:*","matchCriteriaId":"A0D80961-D483-4213-80BF-8D7662A11501"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*","matchCriteriaId":"757EC6C1-F5E2-45CD-9F7F-7760ECEDC842"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*","matchCriteriaId":"59B1B68C-86F1-4FA4-9F82-3E8761ED1E74"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*","matchCriteriaId":"716DDA05-D094-4837-852C-0511CDDD5ABC"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office_converter_pack:2000.0:*:*:*:*:*:*:*","matchCriteriaId":"BAC56810-E3C8-453E-A2B3-B6D0E62B3BBD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:97:*:*:ja:*:*:*:*","matchCriteriaId":"D745459E-1C5B-46D2-BD3D-6AA63F15EE40"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:97:*:*:ko:*:*:*:*","matchCriteriaId":"421DE80D-4C7A-4E33-9896-FDA93C0FBF94"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:97:*:*:zh:*:*:*:*","matchCriteriaId":"46B0E734-C47C-443F-8C73-93EC37DD4567"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:2000:*:*:ja:*:*:*:*","matchCriteriaId":"FF8DA1F4-51F5-4701-BA23-6A77057DD420"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:2000:*:*:ko:*:*:*:*","matchCriteriaId":"FB88D5F8-4D7A-4D77-9F05-4910405E0A2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:2000:*:*:zh:*:*:*:*","matchCriteriaId":"C8CCDE97-AE42-4BB8-9947-5BBD81DA6CA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:97:*:*:ja:*:*:*:*","matchCriteriaId":"1695DE97-5840-4670-A891-F0E9F78A4FEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:97:*:*:ko:*:*:*:*","matchCriteriaId":"C4D4CC44-E1EC-4C6E-A341-DFC6A2C1BE63"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:97:*:*:zh:*:*:*:*","matchCriteriaId":"300D969F-7854-445D-8731-7B82E0C9DA18"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:98:*:*:ja:*:*:*:*","matchCriteriaId":"3B3A5E8E-CCE2-49AF-BAEB-549E3C67430B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:98:*:*:ko:*:*:*:*","matchCriteriaId":"7159E6F4-7AD3-43F1-ADB1-A563CD697E54"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:98:*:*:zh:*:*:*:*","matchCriteriaId":"81B3F4F2-D2A3-47A9-838B-E49349079C63"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2000:*:*:ja:*:*:*:*","matchCriteriaId":"DEAF9432-B59D-43AB-B42D-3CDA2192ED6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2000:*:*:ko:*:*:*:*","matchCriteriaId":"0E2FB09D-03F1-464F-A302-0B32E4633C59"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2000:*:*:zh:*:*:*:*","matchCriteriaId":"413AAFEE-51E4-41F6-A63A-E2018BFB3002"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/946","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-002","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/946","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-002","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0091","sourceIdentifier":"cve@mitre.org","published":"2000-01-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in vchkpw/vpopmail POP authentication package allows remote attackers to gain root privileges via a long username or password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.1:*:*:*:*:*:*:*","matchCriteriaId":"7EE370D9-945E-4DD8-A69C-AED356660732"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.2:*:*:*:*:*:*:*","matchCriteriaId":"D2935241-381C-4EF6-98EE-582C48899124"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.3:*:*:*:*:*:*:*","matchCriteriaId":"2EBE17B9-F890-4496-9B53-856FBB9F717D"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.4:*:*:*:*:*:*:*","matchCriteriaId":"7A1342F1-BD91-4C43-918E-3701EDD0A407"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.5:*:*:*:*:*:*:*","matchCriteriaId":"DDC0A8F8-9244-4D7A-A204-903F53FE29C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.6:*:*:*:*:*:*:*","matchCriteriaId":"16D9ADFA-A94B-49D5-9602-E18E81E0C060"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.7:*:*:*:*:*:*:*","matchCriteriaId":"99259D6D-2AD8-4EFE-A12B-A69A319E5970"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.8:*:*:*:*:*:*:*","matchCriteriaId":"82EF0973-3E81-4AE9-A59E-9F18DBEC99F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.9:*:*:*:*:*:*:*","matchCriteriaId":"0615E738-6FE7-48FD-83C9-FAA147EC9702"},{"vulnerable":true,"criteria":"cpe:2.3:a:inter7:vpopmail:vchkpw_3.4.11:*:*:*:*:*:*:*","matchCriteriaId":"FA6C3AE1-A219-48DD-A3E0-526C516A1728"}]}]}],"references":[{"url":"http://www.inter7.com/vpopmail/","source":"cve@mitre.org"},{"url":"http://www.inter7.com/vpopmail/ChangeLog","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/942","source":"cve@mitre.org"},{"url":"http://www.inter7.com/vpopmail/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.inter7.com/vpopmail/ChangeLog","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/942","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0093","sourceIdentifier":"cve@mitre.org","published":"2000-01-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An installation of Red Hat uses DES password encryption with crypt() for the initial password, instead of md5."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0093","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0093","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0115","sourceIdentifier":"cve@mitre.org","published":"2000-01-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS allows local users to cause a denial of service via invalid regular expressions in a Visual Basic script in an ASP page."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:*:*:*:*:*:*:*:*","matchCriteriaId":"CE9D333C-76E2-4BD9-B98B-5CB96363AB89"}]}]}],"references":[{"url":"https://marc.info/?l=ntbugtraq&m=94881904724731&w=2","source":"cve@mitre.org"},{"url":"https://marc.info/?l=ntbugtraq&m=94881904724731&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0095","sourceIdentifier":"cve@mitre.org","published":"2000-01-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The PMTU discovery procedure used by HP-UX 10.30 and 11.00 for determining the optimum MTU generates large amounts of traffic in response to small packets, allowing remote attackers to cause the system to be used as a packet amplifier."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*","matchCriteriaId":"09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/944","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2041","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/944","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2041","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0096","sourceIdentifier":"cve@mitre.org","published":"2000-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in qpopper 3.0 beta versions allows local users to gain privileges via a long LIST command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0:*:*:*:*:*:*:*","matchCriteriaId":"B1208414-D175-41E2-BCBC-9E5EDBC41FFD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta1:*:*:*:*:*:*:*","matchCriteriaId":"6535E515-B0FF-4FC6-8BCC-AF8EAEDCE099"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta2:*:*:*:*:*:*:*","matchCriteriaId":"6586A031-B6B9-4EC0-B6B7-82BBFA4AA562"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta3:*:*:*:*:*:*:*","matchCriteriaId":"E5364920-D969-4585-A822-E26846CF7BD6"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta4:*:*:*:*:*:*:*","matchCriteriaId":"9781C125-7E2B-41BB-A4B3-2317C3B95CC0"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta5:*:*:*:*:*:*:*","matchCriteriaId":"68CE4256-F1D2-49A5-B7D7-25FC9111BB61"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta6:*:*:*:*:*:*:*","matchCriteriaId":"91310B66-9AAC-44EC-A0CC-3455DB069C17"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta7:*:*:*:*:*:*:*","matchCriteriaId":"ABA8F10C-8C06-45B6-898E-4592FE903CB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta8:*:*:*:*:*:*:*","matchCriteriaId":"9DE692FF-40D9-4CE5-93A5-04082E281202"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta9:*:*:*:*:*:*:*","matchCriteriaId":"D9C0F200-2DB9-4492-95C8-72772B5EC6DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta10:*:*:*:*:*:*:*","matchCriteriaId":"E84B8226-E4DA-4BDE-AC48-9B8999853D49"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta11:*:*:*:*:*:*:*","matchCriteriaId":"DDC2EC10-3396-4C73-A5C5-7280F710A4EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta12:*:*:*:*:*:*:*","matchCriteriaId":"5314989E-4D5D-4A76-A1C1-6B9786142C05"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta13:*:*:*:*:*:*:*","matchCriteriaId":"A01E055E-9B9F-42AF-A531-0B783DED5AC9"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta14:*:*:*:*:*:*:*","matchCriteriaId":"DAEDEE2A-15DA-4D2D-BF03-5417B0243382"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta15:*:*:*:*:*:*:*","matchCriteriaId":"CB9BBB17-7B0A-4ACD-95DF-D0B1D40F8C2B"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta16:*:*:*:*:*:*:*","matchCriteriaId":"4248800A-6F2D-47EC-A62C-0E89DE89153B"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta17:*:*:*:*:*:*:*","matchCriteriaId":"A8249A1D-95D9-4205-9346-3110E250295C"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta18:*:*:*:*:*:*:*","matchCriteriaId":"E37B76A4-E760-45B1-90FF-C97327A28A21"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta19:*:*:*:*:*:*:*","matchCriteriaId":"33430029-28D1-4E4F-B4B7-D2E7EB4D97E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta20:*:*:*:*:*:*:*","matchCriteriaId":"A8C5CDE8-34FB-4AB4-A49D-5D701996CA3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta21:*:*:*:*:*:*:*","matchCriteriaId":"48863B32-5742-4FAB-B49D-B6A771F90FE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta22:*:*:*:*:*:*:*","matchCriteriaId":"A471EFDD-0618-4294-A1C0-4D37E794E3DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta23:*:*:*:*:*:*:*","matchCriteriaId":"CF088417-1645-4F40-802D-143433FACE4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta24:*:*:*:*:*:*:*","matchCriteriaId":"6802F665-8457-44C8-A3F0-91B318BE1014"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta25:*:*:*:*:*:*:*","matchCriteriaId":"8EBE0FA1-7BBE-49AA-AA2B-77C60EDA20AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta26:*:*:*:*:*:*:*","matchCriteriaId":"BCA23E68-E974-49A0-BDB0-AFB3A69D271D"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta27:*:*:*:*:*:*:*","matchCriteriaId":"14B5D240-F160-4419-AD95-577274D640B7"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta28:*:*:*:*:*:*:*","matchCriteriaId":"9843924C-1511-489E-A222-C32113DDB080"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0beta29:*:*:*:*:*:*:*","matchCriteriaId":"62F4369F-1ED0-4CCB-ABFE-D402E5A7599B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/948","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/948","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0097","sourceIdentifier":"cve@mitre.org","published":"2000-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WebHits ISAPI filter in Microsoft Index Server allows remote attackers to read arbitrary files, aka the \"Malformed Hit-Highlighting Argument\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D56759FD-DE03-4E90-8688-B6A49AA24F25"}]}]}],"references":[{"url":"http://www.osvdb.org/1210","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/950","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1210","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/950","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0098","sourceIdentifier":"cve@mitre.org","published":"2000-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Index Server allows remote attackers to determine the real path for a web directory via a request to an Internet Data Query file that does not exist."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D56759FD-DE03-4E90-8688-B6A49AA24F25"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0126","sourceIdentifier":"cve@mitre.org","published":"2000-01-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sample Internet Data Query (IDQ) scripts in IIS 3 and 4 allow remote attackers to read files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0126","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0126","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0113","sourceIdentifier":"cve@mitre.org","published":"2000-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SyGate Remote Management program does not properly restrict access to its administration service, which allows remote attackers to cause a denial of service, or access network traffic statistics."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sybergen:sygate:2.0:*:*:*:*:*:*:*","matchCriteriaId":"64CE9873-D031-4DC9-8FCA-7AF2E7ADBF82"},{"vulnerable":true,"criteria":"cpe:2.3:a:sybergen:sygate:3.11:*:*:*:*:*:*:*","matchCriteriaId":"51E74011-4542-4818-AAF6-2AC5682D244D"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94934808714972&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94952641025328&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94973281714994&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/952","source":"cve@mitre.org"},{"url":"http://www.sybergen.com/support/fix.htm","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94934808714972&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94952641025328&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94973281714994&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/952","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.sybergen.com/support/fix.htm","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0130","sourceIdentifier":"cve@mitre.org","published":"2000-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in SCO scohelp program allows remote attackers to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.02a","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94908470928258&w=2","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.02a","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=94908470928258&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-1216","sourceIdentifier":"cve@mitre.org","published":"2000-01-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in portmir for AIX 4.3.0 allows local users to corrupt lock files and gain root privileges via the echo_error routine."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-120"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.0:*:*:*:*:*:*:*","matchCriteriaId":"92B77367-8BF2-4E68-A7F1-D0780E102CCA"}]}]}],"references":[{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY07832","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.kb.cert.org/vuls/id/433499","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7929","source":"cve@mitre.org","tags":["VDB Entry","Vendor Advisory"]},{"url":"http://www-1.ibm.com/support/docview.wss?uid=isg1IY07832","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.kb.cert.org/vuls/id/433499","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/7929","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0111","sourceIdentifier":"cve@mitre.org","published":"2000-01-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The RightFax web client uses predictable session numbers, which allows remote attackers to hijack user sessions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:avt:rightfax:5.2:*:*:*:*:*:*:*","matchCriteriaId":"46A432E6-2590-4683-B62A-C73F1BD9B584"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/953","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/953","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0116","sourceIdentifier":"cve@mitre.org","published":"2000-01-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Firewall-1 does not properly filter script tags, which allows remote attackers to bypass the \"Strip Script Tags\" restriction by including an extra < in front of the SCRIPT tag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*","matchCriteriaId":"A550C18E-F07A-4A05-87F0-B1D52FDC401C"}]}]}],"references":[{"url":"http://www.osvdb.org/1212","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/954","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1212","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/954","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0117","sourceIdentifier":"cve@mitre.org","published":"2000-01-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The siteUserMod.cgi program in Cobalt RaQ2 servers allows any Site Administrator to modify passwords for other users, site administrators, and possibly admin (root)."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:cobalt_raq:1.0:*:*:*:*:*:*:*","matchCriteriaId":"A8CEF7BC-2B9A-4383-B6AF-4FFA79DE9C54"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*","matchCriteriaId":"0C1E1872-D16C-4848-800C-32B80DD59494"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/951","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/951","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0109","sourceIdentifier":"cve@mitre.org","published":"2000-01-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The mcsp Client Site Processor system (MultiCSP) in Standard and Poor's ComStock is installed with several accounts that have no passwords or easily guessable default passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:comstock:multicsp:4.2:*:*:*:*:*:*:*","matchCriteriaId":"11668EE3-1CFE-4982-805F-F2F61583D081"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0109","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0109","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0132","sourceIdentifier":"cve@mitre.org","published":"2000-01-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Java Virtual Machine allows remote attackers to read files via the getSystemResourceAsStream function."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-200"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:virtual_machine:2000:*:*:*:*:*:*:*","matchCriteriaId":"A299BA2B-FD34-4FD5-8A4B-EA99DA9BA3EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:virtual_machine:3000:*:*:*:*:*:*:*","matchCriteriaId":"DC2655D3-B360-4F82-B9CE-EECC95E0FAEE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/957","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/957","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0101","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Make-a-Store OrderPage shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:make-a-store:orderpage:*:*:*:*:*:*:*:*","matchCriteriaId":"FF532D8A-F91F-431D-8BDA-D6B940C5EE41"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0101","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0101","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0102","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SalesCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:salescart:salescart:*:*:*:*:*:*:*:*","matchCriteriaId":"856DF0A7-2342-4847-8503-36F012607C6C"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0102","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0102","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0103","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SmartCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netsmart:smartcart:*:*:*:*:*:*:*:*","matchCriteriaId":"5022F435-F272-45C5-9199-A0E6E611D07F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0103","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0103","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0104","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Shoptron shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:web_express:shoptron:1.2:*:*:*:*:*:*:*","matchCriteriaId":"4D8F9BDA-C20A-4C4C-B5F9-9DB31B22D07A"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0104","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0104","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0105","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Outlook Express 5.01 and Internet Explorer 5.01 allow remote attackers to view a user's email messages via a script that accesses a variable that references subsequent email messages that are read by the client."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:5.0:*:*:*:*:*:*:*","matchCriteriaId":"1F71D6D7-6CB2-4BE9-839A-A5714144029C"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/962","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/962","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0106","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The EasyCart shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:easycart:easycart:*:*:*:*:*:*:*:*","matchCriteriaId":"81DE1CC4-1098-4885-A89B-D1960933DD63"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0106","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0106","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0107","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux apcd program allows local attackers to modify arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"}]}]}],"references":[{"url":"http://www.debian.org/security/2000/20000201","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/958","source":"cve@mitre.org"},{"url":"http://www.debian.org/security/2000/20000201","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/958","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0108","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Intellivend shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:intelligent_vending_systems:intellivend:*:*:*:*:*:*:*:*","matchCriteriaId":"0B525A39-332B-4EA0-A9F3-E2DADA2F0C91"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0108","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0108","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0110","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WebSiteTool shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:baron_consulting_group:websitetool:*:*:*:*:*:*:*:*","matchCriteriaId":"3F4B11E5-E6D7-4221-98F9-FAAB04CB7C21"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0110","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0110","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0121","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Recycle Bin utility in Windows NT and Windows 2000 allows local users to read or modify files by creating a subdirectory with the victim's SID in the recycler directory, aka the \"Recycle Bin Creation\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*","matchCriteriaId":"5BDCBCB8-DAA3-465F-ADDE-9143B8251989"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*","matchCriteriaId":"B86E0671-ED68-4549-B3AC-FD8BD79B0860"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp3:*:*:*:*:*:*","matchCriteriaId":"BB76E7EC-C396-4537-9065-4E815DA7097C"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp4:*:*:*:*:*:*","matchCriteriaId":"4CD026E2-B073-40A6-AD4A-8C76B9169B01"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp5:*:*:*:*:*:*","matchCriteriaId":"DBFB3E49-3FB5-4947-856D-727CBFFBA543"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp6:*:*:*:*:*:*","matchCriteriaId":"B9236480-6450-42E1-B1FF-F336488A683A"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248399","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/963","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-007","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ248399","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/963","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-007","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0123","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The shopping cart application provided with Filemaker allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:filemaker:filemaker:*:*:pro:*:*:*:*:*","matchCriteriaId":"C2E57AAF-9A43-4039-B333-E788EE678E04"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0123","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0123","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0131","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in War FTPd 1.6x allows users to cause a denial of service via long MKD and CWD commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jgaa:warftpd:1.66x4s:*:*:*:*:*:*:*","matchCriteriaId":"BD95B797-7A40-4D42-844C-758C742C34D6"},{"vulnerable":true,"criteria":"cpe:2.3:a:jgaa:warftpd:1.67.3:*:*:*:*:*:*:*","matchCriteriaId":"A47F294E-DBB2-4406-9CF2-58A9E76C7B50"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94960703721503&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4677","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/966","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94960703721503&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4677","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/966","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0133","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in Tiny FTPd 0.52 beta3 FTP server allows users to execute commands via the STOR, RNTO, MKD, XMKD, RMD, XRMD, APPE, SIZE, and RNFR commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:h._nomura:tiny_ftpdaemon:*:*:*:*:*:*:*:*","versionEndIncluding":"0.52","matchCriteriaId":"66FBDC33-1713-49CA-AA58-AD825B32B578"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/961","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/961","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0134","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Check It Out shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:adgrafix_corporation:check_it_out:*:*:*:*:*:*:*:*","matchCriteriaId":"5ADCB606-CF86-4E96-9C28-6A489C1AEA4F"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0134","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0134","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0135","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The @Retail shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atretail:atretail:*:*:*:*:*:*:*:*","matchCriteriaId":"96CBDA55-DC40-4961-8B5C-057A6D76C570"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0135","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0135","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0136","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Cart32 shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:*:*:*:*:*:*:*:*","matchCriteriaId":"69D0916B-9E1C-4536-820C-DCB759A48D8B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0136","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0136","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0137","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The CartIt shopping cart application allows remote users to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cartit:cartit:*:*:*:*:*:*:*:*","matchCriteriaId":"E05B217C-DE60-4B0F-8592-6C758B311147"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0137","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0137","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0151","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"GNU make follows symlinks when it reads a Makefile from stdin, which allows other local users to execute commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:make:3.77.44:*:*:*:*:*:*:*","matchCriteriaId":"8E7A5639-F2F6-41DE-867E-0178A49C80C0"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/981","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/981","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0157","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetBSD ptrace call on VAX allows local users to gain privileges by modifying the PSL contents in the debugging process."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"1C288A88-11C6-429E-A109-0395D0989264"}]}]}],"references":[{"url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-012.txt.asc","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/992","source":"cve@mitre.org"},{"url":"ftp://ftp.NetBSD.ORG/pub/NetBSD/misc/security/advisories/NetBSD-SA1999-012.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/992","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-1205","sourceIdentifier":"cve@mitre.org","published":"2000-02-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cross site scripting vulnerabilities in Apache 1.3.0 through 1.3.11 allow remote attackers to execute script as other web site visitors via (1) the printenv CGI (printenv.pl), which does not encode its output, (2) pages generated by the ap_send_error_response function such as a default 404, which does not add an explicit charset, or (3) various messages that are generated by certain Apache modules or core code.  NOTE: the printenv issue might still exist for web browsers that can render text/plain content types as HTML, such as Internet Explorer, but CVE regards this as a design limitation of those browsers, not Apache.  The printenv.pl/acuparam vector, discloser on 20070724, is one such variant."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:P/A:N","baseScore":4.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":8.6,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-79"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.0:*:*:*:*:*:*:*","matchCriteriaId":"D9B12229-3F9E-469C-8AD6-7E43FA45B876"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.1:*:*:*:*:*:*:*","matchCriteriaId":"30D94958-0D13-4076-B6F0-61D505136789"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.2:*:*:*:*:*:*:*","matchCriteriaId":"691D7D29-420E-4ABC-844F-D5DD401598F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.3:*:*:*:*:*:*:*","matchCriteriaId":"B22DA22E-54DA-46CF-B3AE-4B0900D8086A"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.4:*:*:*:*:*:*:*","matchCriteriaId":"F90F496A-5D57-448F-A46F-E15F06CBFD01"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.5:*:*:*:*:*:*:*","matchCriteriaId":"1EC3D727-F7C1-4CA1-BBF4-9A38BD3B052F"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.6:*:*:*:*:*:*:*","matchCriteriaId":"89B58983-633F-4D20-80AE-8E7EB865CF83"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.7:*:*:*:*:*:*:*","matchCriteriaId":"EB2EC909-197D-4509-9D89-374D89BBBA26"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.8:*:*:*:*:*:*:*","matchCriteriaId":"96E2083D-E7EC-49D1-A870-7F0B0AF0F614"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.9:*:*:*:*:*:*:*","matchCriteriaId":"19C8989C-D8A6-4AE9-99B6-F2DAE5999EB6"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.10:*:*:*:*:*:*:*","matchCriteriaId":"F715F8CB-A473-4374-8CF1-E9D74EBA5E8F"},{"vulnerable":true,"criteria":"cpe:2.3:a:apache:http_server:1.3.11:*:*:*:*:*:*:*","matchCriteriaId":"7B6EE0E2-D608-4E72-A0E5-F407511405C2"}]}]}],"references":[{"url":"http://archive.cert.uni-stuttgart.de/bugtraq/2002/12/msg00243.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2002-12/0233.html","source":"cve@mitre.org"},{"url":"http://httpd.apache.org/info/css-security/apache_specific.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=118529436424127&w=2","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10938","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35597","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","source":"cve@mitre.org"},{"url":"http://archive.cert.uni-stuttgart.de/bugtraq/2002/12/msg00243.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2002-12/0233.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://httpd.apache.org/info/css-security/apache_specific.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=118529436424127&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/10938","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/35597","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r5419c9ba0951ef73a655362403d12bb8d10fab38274deb3f005816f5%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r5f9c22f9c28adbd9f00556059edc7b03a5d5bb71d4bb80257c0d34e4%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rf2f0f3611f937cf6cfb3b4fe4a67f69885855126110e1e3f2fb2728e%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E","source":"af854a3a-2127-422b-91ae-364da2661108"}],"vendorComments":[{"organization":"Apache","comment":"Fixed in Apache HTTP Server 1.3.12:\nhttp://httpd.apache.org/security/vulnerabilities_13.html","lastModified":"2008-07-02T00:00:00"}]}},{"cve":{"id":"CVE-2000-0112","sourceIdentifier":"cve@mitre.org","published":"2000-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default installation of Debian GNU/Linux uses an insecure Master Boot Record (MBR) which allows a local user to boot from a floppy disk during the installation."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:r5:*:*:*:*:*:*","matchCriteriaId":"D3067DBB-FBA1-48E9-9EC8-5A8D74B9F2D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:pre_potato:*:*:*:*:*","matchCriteriaId":"2B19ABCB-70F0-450E-9A71-2EE8F2BFB2EE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94973075614088&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/960","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94973075614088&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/960","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0114","sourceIdentifier":"cve@mitre.org","published":"2000-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Frontpage Server Extensions allows remote attackers to determine the name of the anonymous account via an RPC POST request to shtml.dll in the /_vti_bin/ virtual directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"547AB6E2-4E9F-4783-8BB4-0AE297A38C9C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0114","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0114","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0469","sourceIdentifier":"cve@mitre.org","published":"2000-02-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Selena Sol WebBanner 4.0 allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:selena_sol:webbanner:4.0:*:*:*:*:*:*:*","matchCriteriaId":"FD550CBE-1DC6-47F5-8BCF-94911830B6CF"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1347","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-22&msg=ILENKALMCAFBLHBGEOFKGEJCCAAA.jwesterink%40jwesterink.daxis.nl","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.2.0.58.20000620193604.00979950%40mail.clark.net","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1347","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-06-22&msg=ILENKALMCAFBLHBGEOFKGEJCCAAA.jwesterink%40jwesterink.daxis.nl","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.2.0.58.20000620193604.00979950%40mail.clark.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0122","sourceIdentifier":"cve@mitre.org","published":"2000-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Frontpage Server Extensions allows remote attackers to determine the physical path of a virtual directory via a GET request to the htimage.exe CGI program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:98:*:*:*:*:*:*:*","matchCriteriaId":"A5F2F998-5866-4DA7-88CF-7987E971947E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*","matchCriteriaId":"D2C6629C-BF53-49A1-B32C-A828CA0A0500"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/470458/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/964","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34719","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/470458/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/964","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34719","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0124","sourceIdentifier":"cve@mitre.org","published":"2000-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"surfCONTROL SuperScout does not properly asign a category to web sites with a . (dot) at the end, which may allow users to bypass web access restrictions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:surfcontrol:superscout:2.6.1.6:*:*:*:*:*:*:*","matchCriteriaId":"FDC26E3B-0A5A-4092-A2F9-E6949C1B182A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/965","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/965","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0125","sourceIdentifier":"cve@mitre.org","published":"2000-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"wwwthreads does not properly cleanse numeric data or table names that are passed to SQL queries, which allows remote attackers to gain privileges for wwwthreads forums."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:wired_community_software:wwwthreads:*:*:*:*:*:*:*:*","matchCriteriaId":"7320CDBE-43EC-46F7-92BB-729157851A41"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/967","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10002031027120.15921-100000%40eight.wiretrip.net","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/967","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10002031027120.15921-100000%40eight.wiretrip.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0127","sourceIdentifier":"cve@mitre.org","published":"2000-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Webspeed configuration program does not properly disable access to the WSMadmin utility, which allows remote attackers to gain privileges via wsisa.dll."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:progress:webspeed:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4CA5B493-3BB1-4847-8055-15B93171EC9B"}]}]}],"references":[{"url":"http://www.progress.com/services/support/cgi-bin/techweb-kbase.cgi/webkb.html?kbid=19412&keywords=security%20Webspeed","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/969","source":"cve@mitre.org"},{"url":"http://www.progress.com/services/support/cgi-bin/techweb-kbase.cgi/webkb.html?kbid=19412&keywords=security%20Webspeed","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/969","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0218","sourceIdentifier":"cve@mitre.org","published":"2000-02-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Linux mount and umount allows local users to gain root privileges via a long relative pathname."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.3:*:*:*:*:*:*:*","matchCriteriaId":"23B38FCC-2C86-4E84-860B-EBAE0FA123B6"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:*:*:*:*:*:*:*:*","matchCriteriaId":"67527281-81FA-4068-9E0A-7B19FB6A208A"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-002.0.txt","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/6980","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7004","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-002.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/6980","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/7004","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0089","sourceIdentifier":"cve@mitre.org","published":"2000-02-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The rdisk utility in Microsoft Terminal Server Edition and Windows NT 4.0 stores registry hive information in a temporary file with permissions that allow local users to read it, aka the \"RDISK Registry Enumeration File\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*","matchCriteriaId":"7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise:*:*:*:*:*","matchCriteriaId":"BBD9C514-5AF7-4849-A535-F0F3C9339051"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249108","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/947","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-004","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ249108","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/947","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-004","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0128","sourceIdentifier":"cve@mitre.org","published":"2000-02-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Finger Server 0.82 allows remote attackers to execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:daniel_beckham:the_finger_server:0.80_beta:*:*:*:*:*:*:*","matchCriteriaId":"F7BBCFD3-60DC-4D6D-BEA9-C47166498B52"},{"vulnerable":true,"criteria":"cpe:2.3:a:daniel_beckham:the_finger_server:0.81_beta:*:*:*:*:*:*:*","matchCriteriaId":"39CC38F7-F512-43BC-93D1-0A8ADC9B9E74"},{"vulnerable":true,"criteria":"cpe:2.3:a:daniel_beckham:the_finger_server:0.82_beta:*:*:*:*:*:*:*","matchCriteriaId":"A2885CB6-08AD-44EA-A89C-F8B863AB7BAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:daniel_beckham:the_finger_server:0.83_beta:*:*:*:*:*:*:*","matchCriteriaId":"A2EDE741-9583-471F-B803-046D5FF76C2D"}]}]}],"references":[{"url":"http://www.glazed.org/finger/changelog.txt","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7610","source":"cve@mitre.org"},{"url":"http://www.glazed.org/finger/changelog.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/7610","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0129","sourceIdentifier":"cve@mitre.org","published":"2000-02-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the SHGetPathFromIDList function of the Serv-U FTP server allows attackers to cause a denial of service by performing a LIST command on a malformed .lnk file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0129","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0129","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0145","sourceIdentifier":"cve@mitre.org","published":"2000-02-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The libguile.so library file used by gnucash in Debian GNU/Linux is installed with world-writable permissions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F92AB32-E7DE-43F4-B877-1F41FA162EC7"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0145","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0145","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0472","sourceIdentifier":"cve@mitre.org","published":"2000-02-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in innd 2.2.2 allows remote attackers to execute arbitrary commands via a cancel request containing a long message ID."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.0:*:*:*:*:*:*:*","matchCriteriaId":"A2480B45-A626-49F5-A48B-BA6DFAA4411B"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.1:*:*:*:*:*:*:*","matchCriteriaId":"21969A37-9F10-4D70-AC73-F3DB4D169AEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.2:*:*:*:*:*:*:*","matchCriteriaId":"94FD2948-EF52-464B-A605-DA3806037762"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.2.1:*:*:*:*:*:*:*","matchCriteriaId":"1CC41E6D-B892-4888-8AEE-12287935F570"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"7DED2B74-71B6-467C-8B07-F6F728AD7BF4"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-016.0.txt","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0003.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0097.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0298.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0330.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1316","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4615","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-016.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0003.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0097.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0298.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0330.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1316","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4615","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0144","sourceIdentifier":"cve@mitre.org","published":"2000-02-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Axis 700 Network Scanner does not properly restrict access to administrator URLs, which allows users to bypass the password protection via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:axis:700_network_document_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4ADB9B02-6ED7-448D-A409-6A2F56AEFCD5"},{"vulnerable":true,"criteria":"cpe:2.3:h:axis:700_network_document_server:1.10:*:*:*:*:*:*:*","matchCriteriaId":"657A10D8-2BBC-4B20-9DB0-D37842C4EC81"},{"vulnerable":true,"criteria":"cpe:2.3:h:axis:700_network_document_server:1.11:*:*:*:*:*:*:*","matchCriteriaId":"3982C911-305E-49B4-90C9-CE12584A7C54"},{"vulnerable":true,"criteria":"cpe:2.3:h:axis:700_network_document_server:1.12:*:*:*:*:*:*:*","matchCriteriaId":"0AA3DD85-191E-48BE-A46F-8990848F8850"},{"vulnerable":true,"criteria":"cpe:2.3:h:axis:700_network_document_server:1.13:*:*:*:*:*:*:*","matchCriteriaId":"86CBA528-BAD0-4848-81B2-281EDEA33DE8"},{"vulnerable":true,"criteria":"cpe:2.3:h:axis:700_network_document_server:1.14:*:*:*:*:*:*:*","matchCriteriaId":"72897C22-B421-496D-8EA4-7B8CB4ED4E68"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0034.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/971","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0034.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/971","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0146","sourceIdentifier":"cve@mitre.org","published":"2000-02-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Java Server in the Novell GroupWise Web Access Enhancement Pack allows remote attackers to cause a denial of service via a long URL to the servlet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*","matchCriteriaId":"E7F809F7-C72F-4869-BE95-EE8BF5F0E111"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0049.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/972","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0049.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/972","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0147","sourceIdentifier":"cve@mitre.org","published":"2000-02-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"snmpd in SCO OpenServer has an SNMP community string that is writable by default, which allows local attackers to modify the host's configuration."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"B8BA72B4-C4AF-41C6-92ED-30B286E00EF5"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.04a","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0045.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/973","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.04a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0045.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/973","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0148","sourceIdentifier":"cve@mitre.org","published":"2000-02-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MySQL 3.22 allows remote attackers to bypass password authentication and access a database via a short check string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.22.26:*:*:*:*:*:*:*","matchCriteriaId":"C883DB55-0CAC-462A-912B-69E9E7E1C79C"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.22.27:*:*:*:*:*:*:*","matchCriteriaId":"45AD5549-07DC-43DA-B277-D7BF16ABE4E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.22.29:*:*:*:*:*:*:*","matchCriteriaId":"C30459B9-0FAC-48DF-9601-AAD1A028846F"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.22.30:*:*:*:*:*:*:*","matchCriteriaId":"86DC48D3-09F1-48BD-A783-0549D4D5E8B0"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.23.8:*:*:*:*:*:*:*","matchCriteriaId":"18E35942-7E70-468E-BA15-97CA5086C1B3"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.23.9:*:*:*:*:*:*:*","matchCriteriaId":"CCB886BB-EA7C-4618-9029-BB16A45A4301"},{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:mysql:3.23.10:*:*:*:*:*:*:*","matchCriteriaId":"56EC4832-82D1-4E57-86DA-8918CA006723"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0053.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/975","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0053.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/975","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0149","sourceIdentifier":"cve@mitre.org","published":"2000-02-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Zeus web server allows remote attackers to view the source code for CGI programs via a null character (%00) at the end of a URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"5963529B-AC59-4A6E-9A5A-C658C4853092"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.2:*:*:*:*:*:*:*","matchCriteriaId":"D0378E46-61DA-4D8D-97F2-F1377401CF3E"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.3:*:*:*:*:*:*:*","matchCriteriaId":"B41474DE-0DE7-4493-B050-307E3CECDECA"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.4:*:*:*:*:*:*:*","matchCriteriaId":"B7CF7BAB-13BB-474C-B8CA-B6193913D9D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.5:*:*:*:*:*:*:*","matchCriteriaId":"ED101610-A479-412B-AD20-0A3C1906F2F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.6:*:*:*:*:*:*:*","matchCriteriaId":"FA500577-636F-417D-B728-2551B14CBB8B"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.7:*:*:*:*:*:*:*","matchCriteriaId":"27932CB0-D66A-41F2-AA81-096B94D5AE30"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.8:*:*:*:*:*:*:*","matchCriteriaId":"925A449C-269B-4E3E-93BD-D5FB69ED2ADE"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.1.9:*:*:*:*:*:*:*","matchCriteriaId":"1BFE4867-4093-4024-AF75-3580513E01B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3:*:*:*:*:*:*:*","matchCriteriaId":"80D7AFB8-4C19-4E4E-9BCE-4C7B45A7BB38"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.1:*:*:*:*:*:*:*","matchCriteriaId":"1D7BD6BD-8945-45FC-909B-853BBD328618"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.2:*:*:*:*:*:*:*","matchCriteriaId":"C9DBE4CC-5AAA-415E-9C2D-5B559377643B"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.3:*:*:*:*:*:*:*","matchCriteriaId":"FF4E0DB8-AE4D-47AA-9815-9AF0590F19E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.4:*:*:*:*:*:*:*","matchCriteriaId":"9135EE22-7B20-47C4-9B28-8706768E4179"},{"vulnerable":true,"criteria":"cpe:2.3:a:zeus_technologies:zeus_web_server:3.3.5:*:*:*:*:*:*:*","matchCriteriaId":"980FDE19-37D5-4135-8CAE-D58AAB0FD210"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0057.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/254","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/977","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3982","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0057.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/254","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/977","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3982","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0215","sourceIdentifier":"cve@mitre.org","published":"2000-02-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in SCO cu program in UnixWare 7.x allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1019","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1019","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0140","sourceIdentifier":"cve@mitre.org","published":"2000-02-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Anywhere POP3 Mail Server allows remote attackers to cause a denial of service via a large number of connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:true_north:internet_anywhere_mail_server:3.1.3:*:*:*:*:*:*:*","matchCriteriaId":"346E073E-72EE-44C6-A24F-39474627F857"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95021326417936&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/980","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95021326417936&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/980","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0141","sourceIdentifier":"cve@mitre.org","published":"2000-02-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Infopop Ultimate Bulletin Board (UBB) allows remote attackers to execute commands via shell metacharacters in the topic hidden field."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:infopop:ultimate_bulletin_board:5.43:*:*:*:*:*:*:*","matchCriteriaId":"109D6BE8-39AD-43A7-B620-DEAA989D809E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/991","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-22&msg=NDBBLKOPOLNKELHPDEFKIEPGCAAA.renzo.toma%40veronica.nl","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-8&msg=20000211224935.A13236%40infomag.ape.relarn.ru","source":"cve@mitre.org"},{"url":"http://www.ultimatebb.com/home/versions.shtml","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/991","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-22&msg=NDBBLKOPOLNKELHPDEFKIEPGCAAA.renzo.toma%40veronica.nl","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-8&msg=20000211224935.A13236%40infomag.ape.relarn.ru","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ultimatebb.com/home/versions.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]}]}},{"cve":{"id":"CVE-2000-0142","sourceIdentifier":"cve@mitre.org","published":"2000-02-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The authentication protocol in Timbuktu Pro 2.0b650 allows remote attackers to cause a denial of service via connections to port 407 and 1417."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netopia:timbuktu_pro:2.0:*:*:*:*:*:*:*","matchCriteriaId":"84DF8888-9F75-4C19-AC1D-96F401764997"},{"vulnerable":true,"criteria":"cpe:2.3:a:netopia:timbuktu_pro:5.2.1:*:*:*:*:*:*:*","matchCriteriaId":"77601D02-02E0-4A19-8B67-3140DDF1DF14"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0142","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0142","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0143","sourceIdentifier":"cve@mitre.org","published":"2000-02-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SSH protocol server sshd allows local users without shell access to redirect a TCP connection through a service that uses the standard system password database for authentication, such as POP or FTP."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:*:*:*:*:*:*:*:*","versionEndIncluding":"1.2.1","matchCriteriaId":"D4EFC03C-F5A7-4B74-B664-5828763B3E8E"},{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","matchCriteriaId":"316C8534-9CE3-456C-A04E-5D2B789FBE31"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"1E9C3330-E163-4699-B7F6-2D9B089E8A6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"011ECCA8-63DD-4FB0-A2F4-B4BAF344242E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*","matchCriteriaId":"86A52DB0-B17A-437C-8E3A-0F824B9F88AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*","matchCriteriaId":"6A9E54C6-7003-46B0-85B3-0C2E7E611D38"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*","matchCriteriaId":"082C8ECC-CDAF-440B-90D0-A1FE028B03F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*","matchCriteriaId":"7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*","matchCriteriaId":"C0C2A220-D8AB-4FAD-8048-F2C1764F965F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*","matchCriteriaId":"5010A78A-394E-4196-90CB-5D371C3BD1EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*","matchCriteriaId":"E5F6F181-41B1-47D1-A216-194DC4C762EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*","matchCriteriaId":"D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*","matchCriteriaId":"45446BD9-3B03-43B6-B686-F6EACFABD699"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*","matchCriteriaId":"FCE6F492-8E28-4FA1-9BF1-96BAF5D68545"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*","matchCriteriaId":"41BF66ED-CB08-440E-AC05-A31371B7A380"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*","matchCriteriaId":"E0EE3216-D8FF-43F0-9329-6676E2CEC250"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*","matchCriteriaId":"9310E12D-1136-4AD6-9678-8ADCD9EE58C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*","matchCriteriaId":"BBEDF399-58DE-491A-8B51-87E0392FF9C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*","matchCriteriaId":"CBDF2DE8-8559-4BED-80AE-E1420BBF4043"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*","matchCriteriaId":"23EB8421-76BF-47D1-B294-68412D5E4572"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*","matchCriteriaId":"D9560989-5342-4C6B-974F-7D90C467BA39"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*","matchCriteriaId":"971835AF-E908-4C74-9DE0-167349138DEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*","matchCriteriaId":"2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*","matchCriteriaId":"926B57D7-009C-4317-ACFB-98551FADC5B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*","matchCriteriaId":"B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*","matchCriteriaId":"7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*","matchCriteriaId":"7D0FF07F-E13B-425F-9892-C50B326B2944"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"338EDA76-05D6-48C0-952E-6244A5F206F3"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0143","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0150","sourceIdentifier":"cve@mitre.org","published":"2000-02-12T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Check Point Firewall-1 allows remote attackers to bypass port access restrictions on an FTP server by forcing it to send malicious packets that Firewall-1 misinterprets as a valid 227 response to a client's PASV attempt."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*","matchCriteriaId":"A550C18E-F07A-4A05-87F0-B1D52FDC401C"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F543272-8C7E-4326-BA97-142FBEA641E5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.1\\(6\\):*:*:*:*:*:*:*","matchCriteriaId":"1EEDB9DD-C862-4783-9F96-88836424B298"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.1\\(6b\\):*:*:*:*:*:*:*","matchCriteriaId":"3BD36C4A-4B90-4012-B4A5-6081C413E302"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.2\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"B1C4F7D5-DCD0-409C-86BF-A96A5253DF64"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.2\\(2\\):*:*:*:*:*:*:*","matchCriteriaId":"8198D129-76D0-4983-BFC4-8EC724FE1B6A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.3:*:*:*:*:*:*:*","matchCriteriaId":"49566EAC-05AF-4880-8000-351AF538E4CC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:4.4\\(4\\):*:*:*:*:*:*:*","matchCriteriaId":"118CBF59-DAD8-468E-B279-F6359E4624F1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:pix_firewall_software:5.0:*:*:*:*:*:*:*","matchCriteriaId":"7AA2E425-904C-4070-8F5F-B81BCF3147F6"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/328867","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/4417","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/979","source":"cve@mitre.org"},{"url":"http://www.kb.cert.org/vuls/id/328867","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/4417","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/979","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0197","sourceIdentifier":"cve@mitre.org","published":"2000-02-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows NT scheduler uses the drive mapping of the interactive user who is currently logged onto the system, which allows the local user to gain privileges by providing a Trojan horse batch file in place of the original batch file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/current/0202.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1050","source":"cve@mitre.org","tags":["Exploit","Patch"]},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/current/0202.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1050","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch"]}]}},{"cve":{"id":"CVE-2000-0167","sourceIdentifier":"cve@mitre.org","published":"2000-02-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS Inetinfo.exe allows local users to cause a denial of service by creating a mail file with a long name and a .txt.eml extension in the pickup directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0002&L=ntbugtraq&F=&S=&P=8800","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0002&L=ntbugtraq&F=&S=&P=8800","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0222","sourceIdentifier":"cve@mitre.org","published":"2000-02-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation for Windows 2000 does not activate the Administrator password until the system has rebooted, which allows remote attackers to connect to the ADMIN$ share without a password until the reboot occurs."},{"lang":"es","value":"La instalación para Windows 2000 no activa la contraseña de administrador hasta que el sistema se ha reiniciado, lo que permite a los atacantes remotos conectarse al recurso compartido ADMIN$ sin contraseña hasta que se produzca el reinicio."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/990","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000215155750.M4500%40safe.hsc.fr","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/990","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000215155750.M4500%40safe.hsc.fr","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0224","sourceIdentifier":"cve@mitre.org","published":"2000-02-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ARCserve agent in SCO UnixWare 7.x allows local attackers to gain root privileges via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:N/I:P/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000101bf78af%2494528870%244d2f45a1%40jmagdych.na.nai.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000101bf78af%2494528870%244d2f45a1%40jmagdych.na.nai.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0094","sourceIdentifier":"cve@mitre.org","published":"2000-02-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"procfs in BSD systems allows local users to gain root privileges by modifying the /proc/pid/mem interface via a modified file descriptor for stderr."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"1C288A88-11C6-429E-A109-0395D0989264"}]}]}],"references":[{"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2000-001.txt.asc","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/20760","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/940","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3995","source":"cve@mitre.org"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2000-001.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/20760","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/940","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3995","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0154","sourceIdentifier":"cve@mitre.org","published":"2000-02-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The ARCserve agent in UnixWare allows local attackers to modify arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:N/I:P/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"http://www.sco.com/security/","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/988","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000101bf78af%2494528870%244d2f45a1%40jmagdych.na.nai.com","source":"cve@mitre.org"},{"url":"http://www.sco.com/security/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/988","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000101bf78af%2494528870%244d2f45a1%40jmagdych.na.nai.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0156","sourceIdentifier":"cve@mitre.org","published":"2000-02-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.x and 5.x allows remote web servers to access files on the client that are outside of its security domain, aka the \"Image Source Redirect\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*","matchCriteriaId":"6219D36E-9E2C-4DC7-8FD5-FAD144A333F6"}]}]}],"references":[{"url":"http://www.osvdb.org/7827","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-009","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3996","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7827","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-009","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/3996","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0158","sourceIdentifier":"cve@mitre.org","published":"2000-02-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in MMDF server allows remote attackers to gain privileges via a long MAIL FROM command to the SMTP daemon."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"2C19F7B3-9043-4E53-90DE-92A4387858A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"0169CBF5-9301-42D2-A6DA-73393BD986D8"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*","matchCriteriaId":"035FBF8B-EB91-4211-9979-8A9E913A54A1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:openserver:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"B8BA72B4-C4AF-41C6-92ED-30B286E00EF5"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.06a","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/997","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000001bf78af%246d0d47a0%244d2f45a1%40jmagdych.na.nai.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=200002181449.JAA03436%40dragonfly.corp.home.net","source":"cve@mitre.org"},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.06a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/997","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000001bf78af%246d0d47a0%244d2f45a1%40jmagdych.na.nai.com","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=200002181449.JAA03436%40dragonfly.corp.home.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0159","sourceIdentifier":"cve@mitre.org","published":"2000-02-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP Ignite-UX does not save /etc/passwd when it creates an image of a trusted system, which can set the password field to a blank and allow an attacker to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"}]}]}],"references":[{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=20000217160216.13708.qmail%40underground.org","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=20000217160216.13708.qmail%40underground.org","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0155","sourceIdentifier":"cve@mitre.org","published":"2000-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT Autorun executes the autorun.inf file on non-removable media, which allows local attackers to specify an alternate program to execute when other users access a drive."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-94"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/993","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000701bf79cd%24fdb5a620%244c4342a6%40mightye.org","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/993","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=000701bf79cd%24fdb5a620%244c4342a6%40mightye.org","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0161","sourceIdentifier":"cve@mitre.org","published":"2000-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sample web sites on Microsoft Site Server 3.0 Commerce Edition do not validate an identification number, which allows remote attackers to execute SQL commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/994","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-010","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/994","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-010","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0162","sourceIdentifier":"cve@mitre.org","published":"2000-02-18T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Microsoft virtual machine (VM) in Internet Explorer 4.x and 5.x allows a remote attacker to read files via a malicious Java applet that escapes the Java sandbox, aka the \"VM File Reading\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0:*:windows_98:*:*:*:*:*","matchCriteriaId":"D0BDA2A8-EBB9-47AB-9DA0-5C24527F7210"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.0:*:windows_nt:*:*:*:*:*","matchCriteriaId":"077B638C-F14D-4048-86C8-B62517C5182F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.1:*:windows_95:*:*:*:*:*","matchCriteriaId":"D45C47A8-8B5F-4A49-8B36-FCBA09029375"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.1:*:windows_nt_4.0:*:*:*:*:*","matchCriteriaId":"84730D4D-7887-4A64-8C76-F50C85309FE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5:*:windows_nt_4.0:*:*:*:*:*","matchCriteriaId":"7AAA310C-7DED-40B3-B5EF-80C7407BB01A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_95:*:*:*:*:*","matchCriteriaId":"0CE25503-0EDA-4AFA-A4B8-36396BB4A4E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:5.0:*:windows_98:*:*:*:*:*","matchCriteriaId":"376DA3A6-FAB8-4B18-B9D9-C176675C7671"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio:6.0:*:*:*:*:*:*:*","matchCriteriaId":"D5CDA0E2-DFBD-4EE0-80DC-76AA55ADFEFC"}]}]}],"references":[{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-011","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0164","sourceIdentifier":"cve@mitre.org","published":"2000-02-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation of Sun Internet Mail Server (SIMS) creates a world-readable file that allows local users to obtain passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:solaris_isp_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"7B2C1CBE-EE61-4253-9F58-06F60739BA3B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1004","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=Pine.SOL.4.21.0002200031320.22675-100000%40klayman.hq.formus.pl","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1004","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=Pine.SOL.4.21.0002200031320.22675-100000%40klayman.hq.formus.pl","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0160","sourceIdentifier":"cve@mitre.org","published":"2000-02-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Microsoft Active Setup ActiveX component in Internet Explorer 4.x and 5.x allows a remote attacker to install software components without prompting the user by stating that the software's manufacturer is Microsoft."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:ie:4.x:*:*:*:*:*:*:*","matchCriteriaId":"45091F51-BA28-4FEB-9F84-58AC2E1DB48F"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5:*:*:*:*:*:*:*","matchCriteriaId":"B4071D03-D955-4C1B-ACD8-A864F7D0FA02"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*","matchCriteriaId":"91EB05F7-D88A-40AA-A8CB-F76C449878AA"}]}]}],"references":[{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=20000221103938.T21312%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-02-15&msg=20000221103938.T21312%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0163","sourceIdentifier":"cve@mitre.org","published":"2000-02-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"asmon and ascpu in FreeBSD allow local users to gain root privileges via a configuration file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/996","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2092","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/996","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2092","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0166","sourceIdentifier":"cve@mitre.org","published":"2000-02-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the InterAccess telnet server TelnetD allows remote attackers to execute commands via a long login name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:interaccess:interaccess_telnetd_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5CD83AB6-6378-4CAA-86B5-0A15D97B2BAB"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95142756403323&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/995","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPGEJHCCAA.labs%40ussrback.com","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95142756403323&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/995","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPGEJHCCAA.labs%40ussrback.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0210","sourceIdentifier":"cve@mitre.org","published":"2000-02-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The lit program in Sun Flex License Manager (FlexLM) follows symlinks, which allows local users to modify arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:N/I:P/A:N","baseScore":1.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:workshop:5.0:*:*:*:*:*:*:*","matchCriteriaId":"9B522DB0-C196-4840-83E5-A8CA2FCB1BDA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/998","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/998","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0182","sourceIdentifier":"cve@mitre.org","published":"2000-02-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"iPlanet Web Server 4.1 allows remote attackers to cause a denial of service via a large number of GET commands, which consumes memory and causes a kernel panic."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:iplanet:iplanet_web_server:4.1_enterprise:*:*:*:*:*:*:*","matchCriteriaId":"F52699EB-CC9F-4768-86CB-FEAA727EDD9B"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0182","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0182","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0211","sourceIdentifier":"cve@mitre.org","published":"2000-02-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows Media server allows remote attackers to cause a denial of service via a series of client handshake packets that are sent in an improper sequence, aka the \"Misordered Windows Media Services Handshake\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_media_services:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D073958F-0428-4E15-97B0-8EDAD0E80632"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_media_services:4.1:*:*:*:*:*:*:*","matchCriteriaId":"AA3DDE73-E623-45A3-AA49-17BAFB89A2CC"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1000","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-013","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1000","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-013","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0213","sourceIdentifier":"cve@mitre.org","published":"2000-02-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Sambar server includes batch files ECHO.BAT and HELLO.BAT in the CGI directory, which allow remote attackers to execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sambar:sambar_server:*:beta7:*:*:*:*:*:*","versionEndIncluding":"4.2","matchCriteriaId":"1C1C9F1B-2D13-4C36-9DBB-675A309BF526"}]}]}],"references":[{"url":"http://www.sambar.com/session/highlight?url=/syshelp/history.htm&words=security+&color=red","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1002","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38B3E60A.6A84FEC3%40cybcom.net","source":"cve@mitre.org"},{"url":"http://www.sambar.com/session/highlight?url=/syshelp/history.htm&words=security+&color=red","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1002","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38B3E60A.6A84FEC3%40cybcom.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0219","sourceIdentifier":"cve@mitre.org","published":"2000-02-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Red Hat 6.0 allows local users to gain root access by booting single user and hitting ^C at the password prompt."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-264"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1005","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200002230248.NAA19185%40cairo.anu.edu.au","source":"cve@mitre.org"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1005","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200002230248.NAA19185%40cairo.anu.edu.au","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10053","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0194","sourceIdentifier":"cve@mitre.org","published":"2000-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"buildxconf in Corel Linux allows local users to modify or create arbitrary files via the -x or -f parameters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:corel:linux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0CB5BDE6-F735-461F-B3B9-066A4876AB0A"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0323.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1007","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0323.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1007","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0195","sourceIdentifier":"cve@mitre.org","published":"2000-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"setxconf in Corel Linux allows local users to gain root access via the -T parameter, which executes the user's .xserverrc file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:corel:linux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0CB5BDE6-F735-461F-B3B9-066A4876AB0A"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0323.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1008","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0323.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1008","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0212","sourceIdentifier":"cve@mitre.org","published":"2000-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"InterAccess TelnetD Server 4.0 allows remote attackers to conduct a denial of service via malformed terminal client configuration information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pragma_systems:interaccess_telnetd_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"4C561A2E-7083-4E3D-B2AE-5F984ED5A617"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1001","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4033","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1001","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4033","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0214","sourceIdentifier":"cve@mitre.org","published":"2000-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FTP Explorer uses weak encryption for storing the username, password, and profile of FTP sites."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ftpx:ftp_explorer:1.00.10:*:*:*:*:*:*:*","matchCriteriaId":"224F78A5-E8B6-4E28-92F7-4508CEA36AB1"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1003","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10002242035500.30645-100000%40unreal.sekure.org","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1003","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10002242035500.30645-100000%40unreal.sekure.org","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0217","sourceIdentifier":"cve@mitre.org","published":"2000-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of SSH allows X forwarding, which could allow a remote attacker to control a client's X sessions via a malicious xauth program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openbsd:openssh:1.2:*:*:*:*:*:*:*","matchCriteriaId":"316C8534-9CE3-456C-A04E-5D2B789FBE31"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*","matchCriteriaId":"1E9C3330-E163-4699-B7F6-2D9B089E8A6D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"F62C0C54-6BC0-4A8B-8006-F1EEEFAC3699"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*","matchCriteriaId":"011ECCA8-63DD-4FB0-A2F4-B4BAF344242E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*","matchCriteriaId":"86A52DB0-B17A-437C-8E3A-0F824B9F88AD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*","matchCriteriaId":"8EDDCCD5-76B1-4981-BA9D-0C4702DD3FBA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*","matchCriteriaId":"6A9E54C6-7003-46B0-85B3-0C2E7E611D38"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*","matchCriteriaId":"082C8ECC-CDAF-440B-90D0-A1FE028B03F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*","matchCriteriaId":"7D0AAA72-CAA5-4985-ADD9-1790CE3C66D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*","matchCriteriaId":"C0C2A220-D8AB-4FAD-8048-F2C1764F965F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*","matchCriteriaId":"5010A78A-394E-4196-90CB-5D371C3BD1EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*","matchCriteriaId":"E5F6F181-41B1-47D1-A216-194DC4C762EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*","matchCriteriaId":"D6EEBDAB-AA0D-407B-B8EE-6C33B0423AF9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*","matchCriteriaId":"45446BD9-3B03-43B6-B686-F6EACFABD699"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*","matchCriteriaId":"FCE6F492-8E28-4FA1-9BF1-96BAF5D68545"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*","matchCriteriaId":"41BF66ED-CB08-440E-AC05-A31371B7A380"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.15:*:*:*:*:*:*:*","matchCriteriaId":"E0EE3216-D8FF-43F0-9329-6676E2CEC250"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.16:*:*:*:*:*:*:*","matchCriteriaId":"9310E12D-1136-4AD6-9678-8ADCD9EE58C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.17:*:*:*:*:*:*:*","matchCriteriaId":"BBEDF399-58DE-491A-8B51-87E0392FF9C9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.18:*:*:*:*:*:*:*","matchCriteriaId":"CBDF2DE8-8559-4BED-80AE-E1420BBF4043"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.19:*:*:*:*:*:*:*","matchCriteriaId":"23EB8421-76BF-47D1-B294-68412D5E4572"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.20:*:*:*:*:*:*:*","matchCriteriaId":"D9560989-5342-4C6B-974F-7D90C467BA39"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.21:*:*:*:*:*:*:*","matchCriteriaId":"971835AF-E908-4C74-9DE0-167349138DEC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.22:*:*:*:*:*:*:*","matchCriteriaId":"2E0D49C5-54B4-4437-A2D3-3EBFA1D9A3CF"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.23:*:*:*:*:*:*:*","matchCriteriaId":"926B57D7-009C-4317-ACFB-98551FADC5B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.24:*:*:*:*:*:*:*","matchCriteriaId":"B0EDBA45-FDEE-4D4B-A6FF-7E953B523DAE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.25:*:*:*:*:*:*:*","matchCriteriaId":"7AF5BDEF-E86B-4F4D-AF6D-B27044A96B1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.26:*:*:*:*:*:*:*","matchCriteriaId":"7D0FF07F-E13B-425F-9892-C50B326B2944"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.27:*:*:*:*:*:*:*","matchCriteriaId":"338EDA76-05D6-48C0-952E-6244A5F206F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.28:*:*:*:*:*:*:*","matchCriteriaId":"F719468E-A218-4EB5-9F8D-7841E84F44C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.29:*:*:*:*:*:*:*","matchCriteriaId":"1E4FCD36-0009-4A93-A190-8FDD11C672CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.30:*:*:*:*:*:*:*","matchCriteriaId":"71727854-1B75-465F-AF8C-DFE6EFF46B40"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh:1.2.31:*:*:*:*:*:*:*","matchCriteriaId":"64B76EA2-D3A6-4751-ADE6-998C2A7B44FA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0:*:*:*:*:*:*:*","matchCriteriaId":"4A7DB2FA-58A8-45B9-AE2E-AE20A872BF90"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2DD92EA8-8C01-4E4E-9AFE-2B1242AB10CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.2:*:*:*:*:*:*:*","matchCriteriaId":"6FB31028-59BA-4833-BF14-3CB1CA18DAAC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.3:*:*:*:*:*:*:*","matchCriteriaId":"8A3E89B6-872D-4541-A413-88A956FDAE81"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"98CC86ED-CA78-4E2A-8A12-4F766DB79733"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"BD500A33-4D0E-44B5-9BBE-A30AA999F662"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.6:*:*:*:*:*:*:*","matchCriteriaId":"EBB8D72F-51E7-47DF-96A4-4EBB517A79D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.7:*:*:*:*:*:*:*","matchCriteriaId":"EC2379BA-621E-4986-AAC5-AF359FD57381"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.8:*:*:*:*:*:*:*","matchCriteriaId":"9972B3A4-369E-40B5-9415-F92B7394604A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"1B6E719F-010B-4B8A-B508-0491BD15C465"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.10:*:*:*:*:*:*:*","matchCriteriaId":"E44D2AE3-DD8B-46D0-B6AB-9F0E6B4DCC4C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"B7735CDD-8BFC-4E30-9C88-27C8943637CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:ssh:ssh2:2.0.12:*:*:*:*:*:*:*","matchCriteriaId":"A1582187-F4BA-44D6-97F0-E78D814A9E9E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1006","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1006","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0220","sourceIdentifier":"cve@mitre.org","published":"2000-02-24T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ZoneAlarm sends sensitive system and network information in cleartext to the Zone Labs server if a user requests more information about an event."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zonelabs:zonealarm:2.0.26:*:*:*:*:*:*:*","matchCriteriaId":"1579C5D8-3F58-4477-97E7-C951DD541920"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0220","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-2000-0220","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0221","sourceIdentifier":"cve@mitre.org","published":"2000-02-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Nautica Marlin bridge allows remote attackers to cause a denial of service via a zero length UDP packet to the SNMP port."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:nortel:nautica_marlin:*:*:*:*:*:*:*:*","matchCriteriaId":"61FE2203-90B6-4DFE-86A6-3C6B8FA42D11"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1009","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1009","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0170","sourceIdentifier":"cve@mitre.org","published":"2000-02-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the man program in Linux allows local users to gain privileges via the MANPAGER environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C9092D88-585D-4A0C-B181-E8D93563C74B"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"A8EED385-8C39-4A40-A507-2EFE7652FB35"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0633B5A6-7A88-4A96-9462-4C09D124ED36"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*","matchCriteriaId":"667CF388-298D-4B64-9BA5-89D153FFA998"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"F7C765FF-0A3D-4BF4-B236-609658776ACA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1011","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1011","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0187","sourceIdentifier":"cve@mitre.org","published":"2000-02-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"EZShopper 3.0 loadpage.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:alex_heiphetz_group:ezshopper:3.0:*:*:*:*:*:*:*","matchCriteriaId":"5DB24D0E-9799-4C96-B9F0-45B821ABA365"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0356.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1014","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0356.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1014","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0188","sourceIdentifier":"cve@mitre.org","published":"2000-02-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"EZShopper 3.0 search.cgi CGI script allows remote attackers to read arbitrary files via a .. (dot dot) attack or execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:alex_heiphetz_group:ezshopper:3.0:*:*:*:*:*:*:*","matchCriteriaId":"5DB24D0E-9799-4C96-B9F0-45B821ABA365"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0356.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1014","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0356.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1014","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0209","sourceIdentifier":"cve@mitre.org","published":"2000-02-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Lynx 2.x allows remote attackers to crash Lynx and possibly execute commands via a long URL in a malicious web page."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_kansas:lynx:2.7:*:*:*:*:*:*:*","matchCriteriaId":"E01953FC-9DA9-4C14-9989-6A81AA2B42E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_kansas:lynx:2.8:*:*:*:*:*:*:*","matchCriteriaId":"08198583-325B-42B7-8856-14C864838AE7"},{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_kansas:lynx:2.8.3_dev22:*:*:*:*:*:*:*","matchCriteriaId":"FD071013-25ED-4898-B603-2D3C97059357"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1012","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1012","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0178","sourceIdentifier":"cve@mitre.org","published":"2000-02-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ServerIron switches by Foundry Networks have predictable TCP/IP sequence numbers, which allows remote attackers to spoof or hijack sessions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:foundrynet:serveriron:5.1.10t12:*:*:*:*:*:*:*","matchCriteriaId":"8F5240D4-EF05-4134-9B75-03C1BFE7D37D"},{"vulnerable":true,"criteria":"cpe:2.3:a:foundrynet:serveriron:6.0:*:*:*:*:*:*:*","matchCriteriaId":"E3BDF7B5-5962-4D37-965B-22022255C96B"}]}]}],"references":[{"url":"http://www.foundrynet.com/bugTraq.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1017","source":"cve@mitre.org"},{"url":"http://www.foundrynet.com/bugTraq.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1017","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0179","sourceIdentifier":"cve@mitre.org","published":"2000-02-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP OpenView OmniBack 2.55 allows remote attackers to cause a denial of service via a large number of connections to port 5555."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openview_omniback_ii:2.55:*:*:*:*:*:*:*","matchCriteriaId":"F72AF3E1-0BD4-45CE-85EC-F07C46AC348C"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openview_omniback_ii:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7BA93113-D9DC-46FE-B0F6-08400503207F"},{"vulnerable":true,"criteria":"cpe:2.3:a:hp:openview_omniback_ii:3.1:*:*:*:*:*:*:*","matchCriteriaId":"0CACE475-0F80-44B5-882C-7FB9ADA4B945"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0387.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1015","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0006-115","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0387.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1015","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX0006-115","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0186","sourceIdentifier":"cve@mitre.org","published":"2000-02-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the dump utility in the Linux ext2fs backup package allows local users to gain privileges via a long command line argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACAAD334-2CA7-4B3B-BA25-302E7610BC2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"E4853E92-5E0A-47B9-A343-D5BEE87D2C27"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"F7C765FF-0A3D-4BF4-B236-609658776ACA"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"C6619B49-8A89-4600-A47F-A39C8BF54259"}]}]}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA-2000-100.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1020","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-100.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1020","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0196","sourceIdentifier":"cve@mitre.org","published":"2000-02-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in mhshow in the Linux nmh package allows remote attackers to execute commands via malformed MIME headers in an email message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:nmh:nmh:1.0.2:*:*:*:*:*:*:*","matchCriteriaId":"CEE22340-554C-4E8F-970B-27264B89F0B0"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:alpha:*:*:*:*:*","matchCriteriaId":"07396B95-E434-46C9-A345-27C9EA9BEA26"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:sparc:*:*:*:*:*","matchCriteriaId":"0775CE08-C5AD-4FF7-AEA9-537B1EAE3BDE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*","matchCriteriaId":"6931FB54-A163-4CE3-BBD9-D345AA0977A6"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*","matchCriteriaId":"5ABD1331-277C-4C31-8186-978243C62255"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*","matchCriteriaId":"C89454B9-4F45-4A42-A06D-ED42D893C544"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*","matchCriteriaId":"1E64093E-7D53-4238-95C3-48ED5A0FFD97"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*","matchCriteriaId":"667CF388-298D-4B64-9BA5-89D153FFA998"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"F7C765FF-0A3D-4BF4-B236-609658776ACA"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"C6619B49-8A89-4600-A47F-A39C8BF54259"}]}]}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA-2000-006.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1018","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-006.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1018","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0203","sourceIdentifier":"cve@mitre.org","published":"2000-02-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Trend Micro OfficeScan client tmlisten.exe allows remote attackers to cause a denial of service via malformed data to port 12345."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:3.5:*:*:*:*:*:*:*","matchCriteriaId":"59CDE5D7-3DEC-42DE-8B5A-63903754937B"}]}]}],"references":[{"url":"http://www.antivirus.com/download/ofce_patch_35.htm","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1013","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=412FC0AFD62ED31191B40008C7E9A11A0D481D%40srvnt04.previnet.it","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=D129BBE1730AD2118A0300805FC1C2FE038AF28B%40209-76-212-10.trendmicro.com","source":"cve@mitre.org"},{"url":"http://www.antivirus.com/download/ofce_patch_35.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1013","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=412FC0AFD62ED31191B40008C7E9A11A0D481D%40srvnt04.previnet.it","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=D129BBE1730AD2118A0300805FC1C2FE038AF28B%40209-76-212-10.trendmicro.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0204","sourceIdentifier":"cve@mitre.org","published":"2000-02-28T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Trend Micro OfficeScan client allows remote attackers to cause a denial of service by making 5 connections to port 12345, which raises CPU utilization to 100%."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:3.5:*:*:*:*:*:*:*","matchCriteriaId":"59CDE5D7-3DEC-42DE-8B5A-63903754937B"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0340.html","source":"cve@mitre.org"},{"url":"http://www.antivirus.com/download/ofce_patch_35.htm","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1013","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=D129BBE1730AD2118A0300805FC1C2FE038AF28B%40209-76-212-10.trendmicro.com","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0340.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.antivirus.com/download/ofce_patch_35.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1013","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=D129BBE1730AD2118A0300805FC1C2FE038AF28B%40209-76-212-10.trendmicro.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0176","sourceIdentifier":"cve@mitre.org","published":"2000-02-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of Serv-U 2.5d and earlier allows remote attackers to determine the real pathname of the server by requesting a URL for a directory or file that does not exist."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cat_soft:serv-u:2.4:*:*:*:*:*:*:*","matchCriteriaId":"1232F683-50D0-43E0-B38C-094F5A800FF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:cat_soft:serv-u:2.5:*:*:*:*:*:*:*","matchCriteriaId":"10A8CC65-6AD3-4CB4-A8D7-F91DC9048F7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:cat_soft:serv-u:2.5a:*:*:*:*:*:*:*","matchCriteriaId":"61E1B73D-6202-4C21-B342-AA2513423F60"},{"vulnerable":true,"criteria":"cpe:2.3:a:cat_soft:serv-u:2.5b:*:*:*:*:*:*:*","matchCriteriaId":"E52DBFB6-09FB-4A8A-AF81-D2A1055EA6D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:cat_soft:serv-u:2.5c:*:*:*:*:*:*:*","matchCriteriaId":"78ED1285-0950-4C6E-BDB1-066C1A484B01"},{"vulnerable":true,"criteria":"cpe:2.3:a:cat_soft:serv-u:2.5d:*:*:*:*:*:*:*","matchCriteriaId":"D83331F2-8E8D-447E-A042-8F73FC728144"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0417.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1016","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-02/0417.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1016","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0191","sourceIdentifier":"cve@mitre.org","published":"2000-02-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Axis StorPoint CD allows remote attackers to access administrator URLs without authentication via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:axis:storpoint_cd:*:*:*:*:*:*:*:*","matchCriteriaId":"7889BD02-DCDE-49F4-B432-DF9EB39C1251"}]}]}],"references":[{"url":"http://www.osvdb.org/19","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1025","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=41256894.00492503.00%40mailgw.backupcentralen.se","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/19","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1025","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=41256894.00492503.00%40mailgw.backupcentralen.se","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0208","sourceIdentifier":"cve@mitre.org","published":"2000-02-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The htdig (ht://Dig) CGI program htsearch allows remote attackers to read arbitrary files by enclosing the file name with backticks (`) in parameters to htsearch."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:htdig:htdig:3.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E1E0D3BD-1A90-40DE-BAB8-2025E851C02C"},{"vulnerable":true,"criteria":"cpe:2.3:a:htdig:htdig:3.1.2:*:*:*:*:*:*:*","matchCriteriaId":"0889D68B-2AC5-4D74-A7FC-4A856E15BF31"},{"vulnerable":true,"criteria":"cpe:2.3:a:htdig:htdig:3.1.3:*:*:*:*:*:*:*","matchCriteriaId":"0DFD60F3-76C8-4463-B540-E19D605C2FCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:htdig:htdig:3.1.4:*:*:*:*:*:*:*","matchCriteriaId":"843F2EB6-4698-45B7-9D58-A5BD91B5A29D"},{"vulnerable":true,"criteria":"cpe:2.3:a:htdig:htdig:3.2.0b1:*:*:*:*:*:*:*","matchCriteriaId":"223D6AA9-BAF4-4A42-AA4B-252F8BB53207"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1026","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1026","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0216","sourceIdentifier":"cve@mitre.org","published":"2000-02-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft email clients in Outlook, Exchange, and Windows Messaging automatically respond to Read Receipt and Delivery Receipt tags, which could allow an attacker to flood a mail system with responses by forging a Read Receipt request that is redirected to a large distribution list."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:exchange_server:*:*:*:*:*:*:*:*","matchCriteriaId":"261FB692-DD0F-494F-A25A-AFCC00BE4585"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:*:*:*:*:*:*:*:*","matchCriteriaId":"91EB05F7-D88A-40AA-A8CB-F76C449878AA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_messaging:*:*:*:*:*:*:*:*","matchCriteriaId":"06BBAE78-16A5-47EC-B5DD-3D01025D2F2D"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0176.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0176.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0189","sourceIdentifier":"cve@mitre.org","published":"2000-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ColdFusion Server 4.x allows remote attackers to determine the real pathname of the server via an HTTP request to the application.cfm or onrequestend.cfm files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"C334CA02-D4EC-40D0-B75F-AFBC0F3903E8"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"3630623B-468C-4E71-9C57-EFF83E5EFA4A"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.5:*:*:*:*:*:*:*","matchCriteriaId":"292DA1C8-5B98-4552-B51B-B0C3F230321F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1021","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1021","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0201","sourceIdentifier":"cve@mitre.org","published":"2000-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The window.showHelp() method in Internet Explorer 5.x does not restrict HTML help files (.chm) to be executed from the local host, which allows remote attackers to execute arbitrary commands via Microsoft Networking."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*","matchCriteriaId":"6219D36E-9E2C-4DC7-8FD5-FAD144A333F6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1033","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1033","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0207","sourceIdentifier":"cve@mitre.org","published":"2000-03-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SGI InfoSearch CGI program infosrch.cgi allows remote attackers to execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sgi:infosearch:1.0:*:*:*:*:*:*:*","matchCriteriaId":"3169FB68-8E0E-4178-8271-1B9C92EB2828"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5:*:*:*:*:*:*:*","matchCriteriaId":"C30D6962-3DBB-4DF8-A04F-8E47AFEDCF99"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"36B60E50-4F5A-4404-BEA3-C94F7D27B156"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.2m:*:*:*:*:*:*:*","matchCriteriaId":"772E3C7E-9947-414F-8642-18653BB048E0"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*","matchCriteriaId":"8D51EC29-8836-4F87-ABF8-FF7530DECBB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*","matchCriteriaId":"518B7253-7B0F-4A0A-ADA7-F3E3B5AAF877"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*","matchCriteriaId":"440B7208-34DB-4898-8461-4E703F7EDFB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*","matchCriteriaId":"D07AA144-6FD7-4C80-B4F2-D21C1AFC864A"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.7:*:*:*:*:*:*:*","matchCriteriaId":"29113D8E-9618-4A0E-9157-678332082858"}]}]}],"references":[{"url":"ftp://patches.sgi.com/support/free/security/advisories/20000501-01-P","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1031","source":"cve@mitre.org"},{"url":"ftp://patches.sgi.com/support/free/security/advisories/20000501-01-P","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1031","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0693","sourceIdentifier":"cve@mitre.org","published":"2000-03-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*","matchCriteriaId":"87FB80D8-1BE7-46F7-9F7E-B7DA88D039F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4:*:*:*:*:*:*:*","matchCriteriaId":"0BAE3D61-9D78-46D7-87EB-5A33ECF86F83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7:*:*:*:*:*:*:*","matchCriteriaId":"710007F4-EF8B-4DCC-89E9-54A13DF9B153"}]}]}],"references":[{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/641","source":"cve@mitre.org"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"cve@mitre.org"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4374","source":"cve@mitre.org"},{"url":"http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/641","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4374","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0177","sourceIdentifier":"cve@mitre.org","published":"2000-03-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"DNSTools CGI applications allow remote attackers to execute arbitrary commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:dnstools_software:dnstools:*:*:*:*:*:*:*:*","versionEndIncluding":"1.0.8","matchCriteriaId":"20EDAB5F-8701-4E3B-A1C3-AA8459BD8583"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0000.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1028","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0000.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1028","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0190","sourceIdentifier":"cve@mitre.org","published":"2000-03-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AOL Instant Messenger (AIM) client allows remote attackers to cause a denial of service via a message with a malformed ASCII value."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:*:*:*:*:*:*:*:*","versionEndIncluding":"3.5","matchCriteriaId":"3EFDAD29-7868-4161-9BA1-7D7E9A72CFDD"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0016.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0016.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0193","sourceIdentifier":"cve@mitre.org","published":"2000-03-02T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of Dosemu in Corel Linux 1.0 allows local users to execute the system.com program and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:corel:linux:1.0:*:*:*:*:*:*:*","matchCriteriaId":"0CB5BDE6-F735-461F-B3B9-066A4876AB0A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1030","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168%40jawa.chilli.net.au","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1030","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003020436.PAA20168%40jawa.chilli.net.au","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0172","sourceIdentifier":"cve@mitre.org","published":"2000-03-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The mtr program only uses a seteuid call when attempting to drop privileges, which could allow local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_kimball_and_roger_wolff:mtr:0.28:*:*:*:*:*:*:*","matchCriteriaId":"374B0A57-7231-403F-B339-1F0E8051E62E"},{"vulnerable":true,"criteria":"cpe:2.3:a:matt_kimball_and_roger_wolff:mtr:0.41:*:*:*:*:*:*:*","matchCriteriaId":"CED7EB1A-43A1-40C8-BA1C-AE826986E89A"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:3.5b2:*:*:*:*:*:*:*","matchCriteriaId":"667CF388-298D-4B64-9BA5-89D153FFA998"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"F7C765FF-0A3D-4BF4-B236-609658776ACA"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"C6619B49-8A89-4600-A47F-A39C8BF54259"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1038","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1038","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0205","sourceIdentifier":"cve@mitre.org","published":"2000-03-03T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Trend Micro OfficeScan allows remote attackers to replay administrative commands and modify the configuration of OfficeScan clients."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:officescan:3.5:*:*:*:*:*:*:*","matchCriteriaId":"59CDE5D7-3DEC-42DE-8B5A-63903754937B"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0015.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.antivirus.com/download/ofce_patch_35.htm","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1013","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=D129BBE1730AD2118A0300805FC1C2FE038AF28B%40209-76-212-10.trendmicro.com","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0015.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.antivirus.com/download/ofce_patch_35.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1013","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=D129BBE1730AD2118A0300805FC1C2FE038AF28B%40209-76-212-10.trendmicro.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0168","sourceIdentifier":"cve@mitre.org","published":"2000-03-04T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Windows 9x operating systems allow an attacker to cause a denial of service via a pathname that includes file device names, aka the \"DOS Device in Path Name\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98se:*:*:*:*:*:*:*:*","matchCriteriaId":"AA733AD2-D948-46A0-A063-D29081A56F1F"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1043","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2126","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCENECCAA.labs%40ussrback.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1043","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2126","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NCBBKFKDOLAGKIAPMILPCENECCAA.labs%40ussrback.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0192","sourceIdentifier":"cve@mitre.org","published":"2000-03-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default installation of Caldera OpenLinux 2.3 includes the CGI program rpm_query, which allows remote attackers to determine what packages are installed on the system."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:2.3:*:*:*:*:*:*:*","matchCriteriaId":"23B38FCC-2C86-4E84-860B-EBAE0FA123B6"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0029.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1036","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0029.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1036","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0206","sourceIdentifier":"cve@mitre.org","published":"2000-03-05T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The installation of Oracle 8.1.5.x on Linux follows symlinks and creates the orainstRoot.sh file with world-writeable permissions, which allows local users to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:C/I:C/A:C","baseScore":6.2,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"MEDIUM","exploitabilityScore":1.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:oracle8i:8.1.5:*:*:*:*:*:*:*","matchCriteriaId":"42AF8B37-C5AA-4B92-A565-214A677C3486"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0023.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1035","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0023.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1035","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0200","sourceIdentifier":"cve@mitre.org","published":"2000-03-06T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Microsoft Clip Art Gallery allows remote attackers to cause a denial of service or execute commands via a malformed CIL (clip art library) file, aka the \"Clip Art Buffer Overrun\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:clip_art:1.0:*:*:*:*:*:*:*","matchCriteriaId":"278667E0-7207-4F5A-9D59-FE300FAF6930"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:greetings:2000:*:*:*:*:*:*:*","matchCriteriaId":"0BE30618-56A2-49DC-80C8-DDED0C1C7E74"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:home_publishing:2000:*:*:*:*:*:*:*","matchCriteriaId":"3BE1F3B2-ACB1-4479-9D6E-214FAEB74983"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1034","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-015","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1034","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-015","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0225","sourceIdentifier":"cve@mitre.org","published":"2000-03-07T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Pocsag POC32 program does not properly prevent remote users from accessing its server port, even if the option has been disabled."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:deti_fliegl:poc32:2.05:*:*:*:*:*:*:*","matchCriteriaId":"37DB43F5-7002-4975-BF2B-2FD8C6D11538"}]}]}],"references":[{"url":"http://www.osvdb.org/259","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1032","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=003601bf854b%246893a090%240100a8c0%40FIREWALKER","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/259","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1032","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=003601bf854b%246893a090%240100a8c0%40FIREWALKER","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0185","sourceIdentifier":"cve@mitre.org","published":"2000-03-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RealMedia RealServer reveals the real IP address of a Real Server, even if the address is supposed to be private."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:5.0:*:*:*:*:*:*:*","matchCriteriaId":"BE671A54-2E76-467E-8945-10982B79F4CE"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:7.0:*:*:*:*:*:*:*","matchCriteriaId":"9392C48A-A1AB-43F7-8374-02BDCE6589AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver_g2:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C3F22E7F-F4D8-4052-A8DF-BA717EDD94B4"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0069.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1049","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0069.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1049","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0202","sourceIdentifier":"cve@mitre.org","published":"2000-03-08T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft SQL Server 7.0 and Microsoft Data Engine (MSDE) 1.0 allow remote attackers to gain privileges via a malformed Select statement in an SQL query."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:data_engine:1.0:*:*:*:*:*:*:*","matchCriteriaId":"F455C373-A9F7-47F9-828E-DEE2C8CC6545"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*","matchCriteriaId":"A2AB95D7-394E-423B-884C-87A9960682EE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1041","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-014","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1041","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-014","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0174","sourceIdentifier":"cve@mitre.org","published":"2000-03-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"StarOffice StarScheduler web server allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:staroffice:5.1:*:*:*:*:*:*:*","matchCriteriaId":"7C93C6E1-EF21-4CAA-96EC-780BDDA33488"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0063.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1040","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0063.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1040","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0175","sourceIdentifier":"cve@mitre.org","published":"2000-03-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in StarOffice StarScheduler web server allows remote attackers to gain root access via a long GET command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:staroffice:5.1:*:*:*:*:*:*:*","matchCriteriaId":"7C93C6E1-EF21-4CAA-96EC-780BDDA33488"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0063.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1039","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0063.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1039","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0184","sourceIdentifier":"cve@mitre.org","published":"2000-03-09T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux printtool sets the permissions of printer configuration files to be world-readable, which allows local attackers to obtain printer share passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"E4853E92-5E0A-47B9-A343-D5BEE87D2C27"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*","matchCriteriaId":"C89454B9-4F45-4A42-A06D-ED42D893C544"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*","matchCriteriaId":"1E64093E-7D53-4238-95C3-48ED5A0FFD97"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0082.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1037","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0082.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1037","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0173","sourceIdentifier":"cve@mitre.org","published":"2000-03-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in the EELS system in SCO UnixWare 7.1.x allows remote attackers to cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.08a","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"ftp://ftp.sco.com/SSE/security_bulletins/SB-00.08a","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0183","sourceIdentifier":"cve@mitre.org","published":"2000-03-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ircII 4.4 IRC client allows remote attackers to execute commands via the DCC chat capability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:michael_sandrof:ircii:4.4.7:*:*:*:*:*:*:*","matchCriteriaId":"7FE0492E-580C-4578-B6F8-4FEEE6E1F69D"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0093.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-008.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1046","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0093.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-008.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1046","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0223","sourceIdentifier":"cve@mitre.org","published":"2000-03-10T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the wmcdplay CD player program for the WindowMaker desktop allows local users to gain root privileges via a long parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sam_hawker:wmcdplay:1.0_beta2:*:*:*:*:*:*:*","matchCriteriaId":"C33086D5-227D-4502-A02E-2C0B725A156A"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0107.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1047","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0107.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1047","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0171","sourceIdentifier":"cve@mitre.org","published":"2000-03-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"atsadc in the atsar package for Linux does not properly check the permissions of an output file, which allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:at_computing:atsar_linux:1.4:*:*:*:*:*:*:*","matchCriteriaId":"CC0265C7-6307-4DE6-BF9D-84960C0E9BA5"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0102.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1048","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0102.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1048","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0181","sourceIdentifier":"cve@mitre.org","published":"2000-03-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Firewall-1 3.0 and 4.0 leaks packets with private IP address information, which could allow remote attackers to determine the real IP address of the host that is making the connection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:3.0:*:*:*:*:*:*:*","matchCriteriaId":"A550C18E-F07A-4A05-87F0-B1D52FDC401C"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0F543272-8C7E-4326-BA97-142FBEA641E5"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*","matchCriteriaId":"100F03E3-1538-47AF-9CA6-E9E5C1DF05D4"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0119.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1256","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1054","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0119.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1256","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1054","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0237","sourceIdentifier":"cve@mitre.org","published":"2000-03-11T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Enterprise Server with Web Publishing enabled allows remote attackers to list arbitrary directories via a GET request for the /publisher directory, which provides a Java applet that allows the attacker to browse the directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.5:*:*:*:*:*:*:*","matchCriteriaId":"34D42A9F-449C-4F4D-B610-538BF133F744"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*","matchCriteriaId":"3577B789-DBB6-413D-B964-B32FE3E8CD8B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1075","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://zsh.stupidphat.com/advisory.cgi?000311-1","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1075","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://zsh.stupidphat.com/advisory.cgi?000311-1","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0230","sourceIdentifier":"cve@mitre.org","published":"2000-03-13T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in imwheel allows local users to gain root privileges via the imwheel-solo script and a long HOME environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:halloween:halloween_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D096A84E-F4FB-40D4-AC59-1E57CBD7E9E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0633B5A6-7A88-4A96-9462-4C09D124ED36"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0168.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-016.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1060","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0168.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-016.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1060","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0180","sourceIdentifier":"cve@mitre.org","published":"2000-03-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Sojourn search engine allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:generation_terrorists_designs_and_concepts:sojourn:2.0:*:*:*:*:*:*:*","matchCriteriaId":"C1287989-3B2F-403C-90F9-9C2D60DD67FF"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0201.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1052","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4197","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0201.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1052","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4197","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0199","sourceIdentifier":"cve@mitre.org","published":"2000-03-14T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"When a new SQL Server is registered in Enterprise Manager for Microsoft SQL Server 7.0 and the \"Always prompt for login name and password\" option is not set, then the Enterprise Manager uses weak encryption to store the login ID and password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:sql_server:7.0:*:*:*:*:*:*:*","matchCriteriaId":"A2AB95D7-394E-423B-884C-87A9960682EE"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1055","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1055","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0169","sourceIdentifier":"cve@mitre.org","published":"2000-03-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Batch files in the Oracle web listener ows-bin directory allow remote attackers to execute commands via a malformed URL that includes '?&'."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:oracle:application_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"F6C0725F-D926-473E-8E74-EA3A38D47EC4"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0211.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1053","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q1/0211.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1053","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0198","sourceIdentifier":"cve@mitre.org","published":"2000-03-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in POP3 and IMAP servers in the MERCUR mail server suite allows remote attackers to cause a denial of service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:mercur_imap4_server:3.20.01:*:*:*:*:*:*:*","matchCriteriaId":"9A7E5072-A782-4056-BB8A-029E1DA64BC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:mercur_mailserver:3.2:*:*:*:*:*:*:*","matchCriteriaId":"2C1C96FB-D121-4097-8838-B88C6F87E63A"},{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:mercur_pop3_server:3.20.01:*:*:*:*:*:*:*","matchCriteriaId":"A66332A0-BDB1-45A6-874A-595B89518CEE"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/current/0137.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/current/0206.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1051","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/current/0137.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/current/0206.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1051","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0233","sourceIdentifier":"cve@mitre.org","published":"2000-03-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"SuSE Linux IMAP server allows remote attackers to bypass IMAP authentication and gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:suse:suse_linux_imap_server:1.0:*:*:*:*:*:*:*","matchCriteriaId":"CBFD2B9C-53B5-4791-9EE6-0DFCCC91E8B9"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/vendor/2000-q1/0035.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/vendor/2000-q1/0035.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0239","sourceIdentifier":"cve@mitre.org","published":"2000-03-15T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the MERCUR WebView WebMail server allows remote attackers to cause a denial of service via a long mail_user parameter in the GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:mercur_imap4_server:3.20.01:*:*:*:*:*:*:*","matchCriteriaId":"9A7E5072-A782-4056-BB8A-029E1DA64BC8"},{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:mercur_mailserver:3.2:*:*:*:*:*:*:*","matchCriteriaId":"2C1C96FB-D121-4097-8838-B88C6F87E63A"},{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:mercur_pop3_server:3.20.01:*:*:*:*:*:*:*","matchCriteriaId":"A66332A0-BDB1-45A6-874A-595B89518CEE"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95325335825295&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1056","source":"cve@mitre.org"},{"url":"http://www.ussrback.com/labs36.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95325335825295&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1056","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ussrback.com/labs36.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0231","sourceIdentifier":"cve@mitre.org","published":"2000-03-16T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux kreatecd trusts a user-supplied path that is used to find the cdrecord program, allowing local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:halloween:halloween_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D096A84E-F4FB-40D4-AC59-1E57CBD7E9E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*","matchCriteriaId":"0AD0FF64-05DF-48C2-9BB5-FD993121FB2E"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0162.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1061","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0162.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1061","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0228","sourceIdentifier":"cve@mitre.org","published":"2000-03-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Windows Media License Manager allows remote attackers to cause a denial of service by sending a malformed request that causes the manager to halt, aka the \"Malformed Media License Request\" Vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_media_rights_manager:4.0:*:*:*:*:*:*:*","matchCriteriaId":"8561A9DF-D3BB-4287-9374-83B09F0CA4C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:windows_media_rights_manager:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FCAF8A5D-A9E3-4E95-BB93-A10C626A314B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1058","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-016","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1058","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-016","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0236","sourceIdentifier":"cve@mitre.org","published":"2000-03-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Enterprise Server with Directory Indexing enabled allows remote attackers to list server directories via web publishing tags such as ?wp-ver-info and ?wp-cs-dump."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7A7B9FDA-DC62-4EC9-9120-A7E6795C2815"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*","matchCriteriaId":"4147A43C-DA7B-4D08-90E9-72DE57B1D61D"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*","matchCriteriaId":"3577B789-DBB6-413D-B964-B32FE3E8CD8B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1063","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38D2173D.24E39DD0%40relaygroup.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1063","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38D2173D.24E39DD0%40relaygroup.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0238","sourceIdentifier":"cve@mitre.org","published":"2000-03-17T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the web server for Norton AntiVirus for Internet Email Gateways allows remote attackers to cause a denial of service via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:norton_antivirus:1.0:*:internet_email_gateways:*:*:*:*:*","matchCriteriaId":"DBDA52B8-F432-49D6-9E75-15A52E7BD24A"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1064","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=s8d1f3e3.036%40kib.co.kodiak.ak.us","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1064","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=s8d1f3e3.036%40kib.co.kodiak.ak.us","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0226","sourceIdentifier":"cve@mitre.org","published":"2000-03-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.0 allows attackers to cause a denial of service by requesting a large buffer in a POST or PUT command which consumes memory, aka the \"Chunked Transfer Encoding Buffer Overflow Vulnerability.\""}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1066","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-018","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1066","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-018","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0613","sourceIdentifier":"cve@mitre.org","published":"2000-03-20T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Secure PIX Firewall does not properly identify forged TCP Reset (RST) packets, which allows remote attackers to force the firewall to close legitimate connections."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:pix_firewall:*:*:*:*:*:*:*:*","matchCriteriaId":"A9C63DA6-1FBC-431A-9D8A-66EA93225294"}]}]}],"references":[{"url":"http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1457","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1454","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=B3D6883199DBD311868100A0C9FC2CDC046B72%40protea.citec.net","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4928","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/707/pixtcpreset-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1457","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1454","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=B3D6883199DBD311868100A0C9FC2CDC046B72%40protea.citec.net","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4928","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0240","sourceIdentifier":"cve@mitre.org","published":"2000-03-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"vqSoft vqServer program allows remote attackers to read arbitrary files via a /........../ in the URL, a variation of a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vqsoft:vqserver:1.9.9:*:*:*:*:*:*:*","matchCriteriaId":"C8EF307C-8279-416D-8A4B-4FFDAF6DD88B"}]}]}],"references":[{"url":"http://www.osvdb.org/270","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1067","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.1.20000321084646.0095c7f0%40olga.swip.net","source":"cve@mitre.org"},{"url":"http://www.vqsoft.com/vq/server/faqs/dotdotbug.html","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.osvdb.org/270","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1067","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.1.20000321084646.0095c7f0%40olga.swip.net","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.vqsoft.com/vq/server/faqs/dotdotbug.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]}]}},{"cve":{"id":"CVE-2000-0241","sourceIdentifier":"cve@mitre.org","published":"2000-03-21T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"vqSoft vqServer stores sensitive information such as passwords in cleartext in the server.cfg file, which allows attackers to gain privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:vqsoft:vqserver:1.9.9:*:*:*:*:*:*:*","matchCriteriaId":"C8EF307C-8279-416D-8A4B-4FFDAF6DD88B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1068","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.1.20000321084646.0095c7f0%40olga.swip.net","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1068","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=4.1.20000321084646.0095c7f0%40olga.swip.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0229","sourceIdentifier":"cve@mitre.org","published":"2000-03-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"gpm-root in the gpm package does not properly drop privileges, which allows local users to gain privileges by starting a utility from gpm-root."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:alessandro_rubini:gpm:1.18.1:*:*:*:*:*:*:*","matchCriteriaId":"FD68842D-DD39-4FFD-95B5-0A4BB28D9F94"},{"vulnerable":true,"criteria":"cpe:2.3:o:alessandro_rubini:gpm:1.19:*:*:*:*:*:*:*","matchCriteriaId":"8156E792-8374-41CD-B60C-DAB2911E7169"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.0:*:*:*:*:*:*:*","matchCriteriaId":"203BDD63-2FA5-42FD-A9CD-6BDBB41A63C4"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:pre_potato:*:*:*:*:*","matchCriteriaId":"2B19ABCB-70F0-450E-9A71-2EE8F2BFB2EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*","matchCriteriaId":"BCC94EF9-5872-402F-B2FC-06331A924BB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*","matchCriteriaId":"0AD0FF64-05DF-48C2-9BB5-FD993121FB2E"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_45.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-009.html","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-045.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1069","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0242.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_45.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-009.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-045.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1069","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0247","sourceIdentifier":"cve@mitre.org","published":"2000-03-22T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Unknown vulnerability in Generic-NQS (GNQS) allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnqs:gnqs:3.50.6:*:*:*:*:*:*:*","matchCriteriaId":"CBF4E8A5-6544-40B6-B429-AE3A6C7D0852"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnqs:gnqs:3.50.7:*:*:*:*:*:*:*","matchCriteriaId":"73434B4D-B226-4F27-A2E8-090ADD490E04"}]}]}],"references":[{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:13.generic-nqs.asc","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0236.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://ftp.gnqs.org/pub/gnqs/source/by-version-number/v3.50/Generic-NQS-3.50.8-ChangeLog.txt","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1842","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4306","source":"cve@mitre.org"},{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:13.generic-nqs.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0236.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://ftp.gnqs.org/pub/gnqs/source/by-version-number/v3.50/Generic-NQS-3.50.8-ChangeLog.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1842","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4306","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0227","sourceIdentifier":"cve@mitre.org","published":"2000-03-23T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Linux 2.2.x kernel does not restrict the number of Unix domain sockets as defined by the wmem_max parameter, which allows local users to cause a denial of service by requesting a large number of sockets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*","matchCriteriaId":"0EEF4480-D50B-464C-AE39-A12455DBC99F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*","matchCriteriaId":"15928E10-7D41-45B2-87D6-8AA10190A8EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.3.99:pre2:*:*:*:*:*:*","matchCriteriaId":"28ECE0D4-624D-4804-8013-DBA9BAF659ED"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0254.html","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95421263519558&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1072","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4186","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0254.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=95421263519558&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1072","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4186","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0242","sourceIdentifier":"cve@mitre.org","published":"2000-03-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"WindMail allows remote attackers to read arbitrary files or execute commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:geocel:windmail:3.0:*:*:*:*:*:*:*","matchCriteriaId":"6F2AEF1D-D1FC-47F4-B603-9A48C5A7D46B"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1073","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-03-22&msg=20000325224146.6839.qmail%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1073","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-03-22&msg=20000325224146.6839.qmail%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0243","sourceIdentifier":"cve@mitre.org","published":"2000-03-25T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AnalogX SimpleServer:WWW HTTP server 1.03 allows remote attackers to cause a denial of service via a short GET request to cgi-bin."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:analogx:simpleserver_www:1.0.3:*:*:*:*:*:*:*","matchCriteriaId":"B310C106-DC4E-4600-9218-984E1A7D083E"}]}]}],"references":[{"url":"http://www.analogx.com/contents/download/network/sswww.htm","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1265","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1076","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555%40post2.rnci.com","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4189","source":"cve@mitre.org"},{"url":"http://www.analogx.com/contents/download/network/sswww.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1265","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1076","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=web-5645555%40post2.rnci.com","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4189","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0281","sourceIdentifier":"cve@mitre.org","published":"2000-03-26T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the Napster client beta 5 allows remote attackers to cause a denial of service via a long message."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:napster:napster_client:beta_5:*:*:*:*:*:*:*","matchCriteriaId":"ABE8E5B3-6378-458D-9B99-89C5D35156F9"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0277.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0299.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0277.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0299.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0235","sourceIdentifier":"cve@mitre.org","published":"2000-03-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the huh program in the orville-write package allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"}]}]}],"references":[{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:10-orville-write.asc","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1263","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1070","source":"cve@mitre.org"},{"url":"ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:10-orville-write.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1263","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1070","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0245","sourceIdentifier":"cve@mitre.org","published":"2000-03-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in SGI IRIX objectserver daemon allows remote attackers to create user accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*","matchCriteriaId":"E292DA15-91BF-4957-9C0F-A69518538BED"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*","matchCriteriaId":"26144F94-63FD-4907-B548-09B68C2FC9B3"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*","matchCriteriaId":"92BF03B6-9CDC-4161-9C1C-3E73582C3D83"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*","matchCriteriaId":"26309EFA-0991-46B6-9818-F0FBB902D5F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B6A81ED6-CE92-4C10-AA2B-AB9AF573D120"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*","matchCriteriaId":"D157E1C1-F82B-4FDF-9ADB-5571B75E7D6B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*","matchCriteriaId":"966C1A13-8007-408D-96BE-0DA3BB6CA401"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"}]}]}],"references":[{"url":"ftp://sgigate.sgi.com/security/20000303-01-PX","source":"cve@mitre.org"},{"url":"http://www.ciac.org/ciac/bulletins/k-030.shtml","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1267","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1079","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003290852.aa27218%40blaze.arl.mil","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4206","source":"cve@mitre.org"},{"url":"ftp://sgigate.sgi.com/security/20000303-01-PX","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ciac.org/ciac/bulletins/k-030.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1267","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1079","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200003290852.aa27218%40blaze.arl.mil","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4206","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0289","sourceIdentifier":"cve@mitre.org","published":"2000-03-27T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IP masquerading in Linux 2.2.x allows remote attackers to route UDP packets through the internal interface by modifying the external source IP address and port number to match those of an established connection."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.1:*:*:*:*:*:*:*","matchCriteriaId":"3C67BDA1-9451-4026-AC6D-E912C882A757"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:*:*:*:*:*:*","matchCriteriaId":"58B90124-0543-4226-BFF4-13CCCBCCB243"},{"vulnerable":true,"criteria":"cpe:2.3:o:debian:debian_linux:2.2:*:pre_potato:*:*:*:*:*","matchCriteriaId":"2B19ABCB-70F0-450E-9A71-2EE8F2BFB2EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.10:*:*:*:*:*:*:*","matchCriteriaId":"AA3D3E03-0ABE-4325-AD67-BA8EA16B6DBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.12:*:*:*:*:*:*:*","matchCriteriaId":"0EEF4480-D50B-464C-AE39-A12455DBC99F"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.14:*:*:*:*:*:*:*","matchCriteriaId":"15928E10-7D41-45B2-87D6-8AA10190A8EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*","matchCriteriaId":"6931FB54-A163-4CE3-BBD9-D345AA0977A6"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*","matchCriteriaId":"5ABD1331-277C-4C31-8186-978243C62255"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*","matchCriteriaId":"C89454B9-4F45-4A42-A06D-ED42D893C544"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*","matchCriteriaId":"1E64093E-7D53-4238-95C3-48ED5A0FFD97"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0284.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_48.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1078","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0284.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_48.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1078","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0244","sourceIdentifier":"cve@mitre.org","published":"2000-03-29T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Citrix ICA (Independent Computing Architecture) protocol uses weak encryption (XOR) for user authentication."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:metaframe:*:*:windows_2000:*:*:*:*:*","versionEndIncluding":"1.8","matchCriteriaId":"0E71883B-EA60-4BE2-9A38-C0EAB30C7756"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:metaframe:*:*:windows_nt_4.0_tse:*:*:*:*:*","versionEndIncluding":"1.8","matchCriteriaId":"7D434E7D-2D68-417C-8AA8-2F8625746C81"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:metaframe:1.0:*:unix:*:*:*:*:*","matchCriteriaId":"D7E2FE0C-4763-4624-83D4-B8D43E303600"},{"vulnerable":true,"criteria":"cpe:2.3:a:citrix:winframe:3.5_1.8_for_windows_nt:*:*:*:*:*:*:*","matchCriteriaId":"F396ECA2-2C14-455D-A5D9-5299B42F5F1E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1077","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000%40naughty.monkey.org","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1077","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.BSO.4.20.0003290949280.2640-100000%40naughty.monkey.org","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0152","sourceIdentifier":"cve@mitre.org","published":"2000-03-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Remote attackers can cause a denial of service in Novell BorderManager 3.5 by pressing the enter key in a telnet connection to port 2000."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:novell:bordermanager:3.0:*:*:*:*:*:*:*","matchCriteriaId":"690D90A8-E5F4-492D-A338-222CBEB5819A"},{"vulnerable":true,"criteria":"cpe:2.3:a:novell:bordermanager:3.5:*:*:*:*:*:*:*","matchCriteriaId":"3DCB9A5D-862A-4266-94D3-385B611A7960"}]}]}],"references":[{"url":"http://www.osvdb.org/7468","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/976","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7468","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/976","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0232","sourceIdentifier":"cve@mitre.org","published":"2000-03-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft TCP/IP Printing Services, aka Print Services for Unix, allows an attacker to cause a denial of service via a malformed TCP/IP print request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0306.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1082","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-021","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-03/0306.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1082","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-021","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0246","sourceIdentifier":"cve@mitre.org","published":"2000-03-30T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.0 and 5.0 does not properly perform ISAPI extension processing if a virtual directory is mapped to a UNC share, which allows remote attackers to read the source code of ASP and other files, aka the \"Virtualized UNC Share\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.0:*:*:*:*:*:*:*","matchCriteriaId":"81514AB5-388D-4D13-B63A-C237A502B86A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:commercial_internet_system:2.5:*:*:*:*:*:*:*","matchCriteriaId":"879AFDCC-B9D8-41EF-85DD-70CC1BD5227C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:proxy_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"2F7BF233-8DE6-4DC4-B9ED-5D4A180DD8B9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*","matchCriteriaId":"4A503018-356B-46D9-965F-60750B5B7484"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:site_server_commerce:3.0:*:*:*:*:*:*:*","matchCriteriaId":"DD78B678-82A4-4485-BC4A-809A5FB105E9"}]}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=249599","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1081","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-019","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=249599","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1081","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-019","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0234","sourceIdentifier":"cve@mitre.org","published":"2000-03-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of Cobalt RaQ2 and RaQ3 as specified in access.conf allows remote attackers to view sensitive contents of a .htaccess file."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*","matchCriteriaId":"0C1E1872-D16C-4848-800C-32B80DD59494"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1083","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2150","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000330220757.28456.qmail%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1083","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2150","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000330220757.28456.qmail%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0290","sourceIdentifier":"cve@mitre.org","published":"2000-03-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Webstar HTTP server allows remote attackers to cause a denial of service via a long GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:4d:webstar_http_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"CEE20C8E-4CEB-4EAF-92B1-69139BA8EC1E"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0005.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1822","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4792","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0005.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1822","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4792","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0296","sourceIdentifier":"cve@mitre.org","published":"2000-03-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"fcheck allows local users to gain privileges by embedding shell metacharacters into file names that are processed by fcheck."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:michael_a._gumienny:fcheck:2.7.45:*:*:*:*:*:*:*","matchCriteriaId":"57D80F13-676D-4B97-A376-2D9F0E85D673"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/current/0011.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1086","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/current/0011.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1086","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0302","sourceIdentifier":"cve@mitre.org","published":"2000-03-31T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Index Server allows remote attackers to view the source code of ASP files by appending a %20 to the filename in the CiWebHitsFile argument to the null.htw URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:index_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D56759FD-DE03-4E90-8688-B6A49AA24F25"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95453598317340&w=2","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/271","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1084","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95453598317340&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/271","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1084","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-006","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0790","sourceIdentifier":"cve@mitre.org","published":"2000-04-01T05:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A remote attacker can read information from a Netscape user's cache via JavaScript."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF"}]}]}],"references":[{"url":"http://home.netscape.com/security/notes/jscachebrowsing.html","source":"cve@mitre.org"},{"url":"http://home.netscape.com/security/notes/jscachebrowsing.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0277","sourceIdentifier":"cve@mitre.org","published":"2000-04-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft Excel 97 and 2000 does not warn the user when executing Excel Macro Language (XLM) macros in external text files, which could allow an attacker to execute a macro virus, aka the \"XLM Text Macro\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-254"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:excel:97:*:*:*:*:*:*:*","matchCriteriaId":"A78536AA-8694-4E0E-B7C6-9E5C3787D849"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*","matchCriteriaId":"F55D42D5-7371-47C2-BF55-B7F51C19B61E"}]}]}],"references":[{"url":"http://www.osvdb.org/1272","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/1087","source":"cve@mitre.org","tags":["Third Party Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-022","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1272","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/1087","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-022","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0280","sourceIdentifier":"cve@mitre.org","published":"2000-04-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the RealNetworks RealPlayer client versions 6 and 7 allows remote attackers to cause a denial of service via a long Location URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:N/A:P","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:6.0:*:win:*:*:*:*:*","matchCriteriaId":"0DF36439-BC5B-4DB9-8AC7-57E4C15CC0D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realplayer:7.0:*:win:*:*:*:*:*","matchCriteriaId":"27A1EB45-9CDB-434D-81EB-30E590E3F9A7"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0018.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1088","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0018.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1088","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0297","sourceIdentifier":"cve@mitre.org","published":"2000-04-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Allaire Forums 2.0.5 allows remote attackers to bypass access restrictions to secure conferences via the rightAccessAllForums or rightModerateAllForums variables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:forums:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"56882CBB-6AE2-4918-80FF-CB22CD57DF54"}]}]}],"references":[{"url":"http://www.osvdb.org/1270","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1085","source":"cve@mitre.org"},{"url":"http://www2.allaire.com/handlers/index.cfm?ID=15099&Method=Full","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1270","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1085","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www2.allaire.com/handlers/index.cfm?ID=15099&Method=Full","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0634","sourceIdentifier":"cve@mitre.org","published":"2000-04-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The web administration interface for CommuniGate Pro 3.2.5 and earlier allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:stalker:communigate_pro:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"ACA7E146-9B89-4D96-B0AF-5A7D8CF7E933"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0223.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/5774","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1493","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5105","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-07/0223.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/5774","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1493","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/5105","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0299","sourceIdentifier":"cve@mitre.org","published":"2000-04-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in WebObjects.exe in the WebObjects Developer 4.5 package allows remote attackers to cause a denial of service via an HTTP request with long headers such as Accept."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:webobjects:4.5:*:*:*:*:*:*:*","matchCriteriaId":"D101474C-842F-45A7-A20D-00F6810C3F13"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0020.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0020.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0255","sourceIdentifier":"cve@mitre.org","published":"2000-04-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Nbase-Xyplex EdgeBlaster router allows remote attackers to cause a denial of service via a scan for the FormMail CGI program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:nbase-xyplex:edgeblaster:1.0:*:*:*:*:*:*:*","matchCriteriaId":"4CDC283E-B1BD-474C-BE50-CCC03152E182"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0022.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1091","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0022.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1091","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0251","sourceIdentifier":"cve@mitre.org","published":"2000-04-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP-UX 11.04 VirtualVault (VVOS) sends data to unprivileged processes via an interface that has multiple aliased IP addresses."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.4:*:*:*:*:*:*:*","matchCriteriaId":"F038B325-A982-43FB-9146-E103CCFB5C41"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:vvos:3.50:*:*:*:*:*:*:*","matchCriteriaId":"C74B2BE9-2A39-4F69-9DF5-86985E7FB394"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0021.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1090","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0021.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1090","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0300","sourceIdentifier":"cve@mitre.org","published":"2000-04-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default encryption method of PcAnywhere 9.x uses weak encryption, which allows remote attackers to sniff and decrypt PcAnywhere or NT domain accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*","matchCriteriaId":"CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1093","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000406030958.23902.qmail%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1093","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000406030958.23902.qmail%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0301","sourceIdentifier":"cve@mitre.org","published":"2000-04-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Ipswitch IMAIL server 6.02 and earlier allows remote attackers to cause a denial of service via the AUTH CRAM-MD5 command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EFEFE5A5-6589-4316-9C9F-2F8109696158"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.5:*:*:*:*:*:*:*","matchCriteriaId":"DB3992E3-D0C8-4A48-B4E1-D31B0D79CEE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.6:*:*:*:*:*:*:*","matchCriteriaId":"65248233-61A3-4085-8808-6FC2FD87EAF6"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.7:*:*:*:*:*:*:*","matchCriteriaId":"B37214DE-41E8-4DD4-AFBF-E608B88D6EAD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:5.0.8:*:*:*:*:*:*:*","matchCriteriaId":"6E11FF5E-9B3D-4818-B091-1286ECF47937"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:6.0:*:*:*:*:*:*:*","matchCriteriaId":"9EADF489-0420-4C47-9F73-78114C2042F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*","matchCriteriaId":"EAEA8FB7-3D42-4A39-BCCD-2DE3BC3EAC19"},{"vulnerable":true,"criteria":"cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*","matchCriteriaId":"12658962-53E6-49EB-83EF-04A1B5D693B3"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95505800117143&w=2","source":"cve@mitre.org"},{"url":"http://support.ipswitch.com/kb/IM-20000208-DM02.htm","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1094","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=95505800117143&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://support.ipswitch.com/kb/IM-20000208-DM02.htm","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1094","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0279","sourceIdentifier":"cve@mitre.org","published":"2000-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BeOS allows remote attackers to cause a denial of service via malformed packets whose length field is less than the length of the headers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:be:beos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"0E8314CD-9480-4F0E-B2E2-DED493C4D575"},{"vulnerable":true,"criteria":"cpe:2.3:o:be:beos:4.5:*:*:*:*:*:*:*","matchCriteriaId":"A78731F7-6AFC-4349-972C-929323519225"},{"vulnerable":true,"criteria":"cpe:2.3:o:be:beos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6EBFAEE-C1D9-48AE-AFE3-2C44CAC74616"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0029.html","source":"cve@mitre.org"},{"url":"http://bebugs.be.com/devbugs/detail.php3?oid=2505312","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1100","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0029.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://bebugs.be.com/devbugs/detail.php3?oid=2505312","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1100","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0298","sourceIdentifier":"cve@mitre.org","published":"2000-04-07T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The unattended installation of Windows 2000 with the OEMPreinstall option sets insecure permissions for the All Users and Default Users directories."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0027.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1758","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4278","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0027.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1758","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4278","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0273","sourceIdentifier":"cve@mitre.org","published":"2000-04-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"PCAnywhere allows remote attackers to cause a denial of service by terminating the connection before PCAnywhere provides a login prompt."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:8.0:*:*:*:*:*:*:*","matchCriteriaId":"447EE4D0-ED48-490E-BC1C-831A165CFF29"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*","matchCriteriaId":"CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1095","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0031.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1095","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0274","sourceIdentifier":"cve@mitre.org","published":"2000-04-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Linux trustees kernel patch allows attackers to cause a denial of service by accessing a file or directory with a long name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:bray_systems:linux_trustees:1.5:*:*:*:*:*:*:*","matchCriteriaId":"39D83A24-79B0-407C-BBD2-36373AF22877"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0035.html","source":"cve@mitre.org"},{"url":"http://www.braysystems.com/linux/trustees.html","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/1096","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0035.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.braysystems.com/linux/trustees.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/1096","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0275","sourceIdentifier":"cve@mitre.org","published":"2000-04-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"CRYPTOCard CryptoAdmin for PalmOS uses weak encryption to store a user's PIN number, which allows an attacker with access to the .PDB file to generate valid PT-1 tokens after cracking the PIN."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cryptocard:cryptoadmin:4.1:*:*:*:*:*:*:*","matchCriteriaId":"2915A632-CCE7-4214-828A-5B43D4ED05E2"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0033.html","source":"cve@mitre.org"},{"url":"http://www.l0pht.com/advisories/cc-pinextract.txt","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1097","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0033.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.l0pht.com/advisories/cc-pinextract.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1097","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0276","sourceIdentifier":"cve@mitre.org","published":"2000-04-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BeOS 4.5 and 5.0 allow local users to cause a denial of service via malformed direct system calls using interrupt 37."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:be:beos:4.5:*:*:*:*:*:*:*","matchCriteriaId":"A78731F7-6AFC-4349-972C-929323519225"},{"vulnerable":true,"criteria":"cpe:2.3:o:be:beos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6EBFAEE-C1D9-48AE-AFE3-2C44CAC74616"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1098","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000410131628.659.qmail%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1098","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000410131628.659.qmail%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0294","sourceIdentifier":"cve@mitre.org","published":"2000-04-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in healthd for FreeBSD allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:jim_housley:healthd:0.1:*:*:*:*:*:*:*","matchCriteriaId":"11E4A3B0-5E5F-4878-96D1-D2281A215248"},{"vulnerable":true,"criteria":"cpe:2.3:a:jim_housley:healthd:0.2:*:*:*:*:*:*:*","matchCriteriaId":"BB9E7024-BD07-4561-99D1-F54771D8A135"},{"vulnerable":true,"criteria":"cpe:2.3:a:jim_housley:healthd:0.3:*:*:*:*:*:*:*","matchCriteriaId":"303A28C2-894F-4140-9C28-0C0982C14A2D"}]}]}],"references":[{"url":"http://www.osvdb.org/606","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1107","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2162","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/606","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1107","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2162","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0695","sourceIdentifier":"cve@mitre.org","published":"2000-04-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sybase:powerdynamo:3.0.652:*:*:*:*:*:*:*","matchCriteriaId":"26CB5AE3-4DA9-4CC9-9EEB-983821A6D226"}]}]}],"references":[{"url":"http://www.osvdb.org/1064","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/620","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1064","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/620","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0699","sourceIdentifier":"cve@mitre.org","published":"2000-04-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:bluestone:sapphire_web:5.0:*:*:*:*:*:*:*","matchCriteriaId":"44EF3E30-37A2-455A-9815-9CDFF52CC2CA"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/623","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/623","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0701","sourceIdentifier":"cve@mitre.org","published":"2000-04-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-16"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ173039","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/626","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ173039","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/626","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0979","sourceIdentifier":"cve@mitre.org","published":"2000-04-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SCO UnixWare privileged process system allows local users to gain root privileges by using a debugger such as gdb to insert traps into _init before the privileged process is executed."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*","matchCriteriaId":"17439B5B-0B66-490B-9B53-2C9D576C879F"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF9FD7BF-97E4-426D-881F-03C9D5B8895D"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1:*:*:*:*:*:*:*","matchCriteriaId":"B200C05F-0E89-4172-B500-47C2573D4461"},{"vulnerable":true,"criteria":"cpe:2.3:o:sco:unixware:7.1.1:*:*:*:*:*:*:*","matchCriteriaId":"71DDB9D9-AD7B-479D-B128-7150286EE563"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=94530783815434&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/869","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=94530783815434&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/869","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0252","sourceIdentifier":"cve@mitre.org","published":"2000-04-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The dansie shopping cart application cart.pl allows remote attackers to execute commands via a shell metacharacters in a form variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:craig_dansie:dansie_shopping_cart:3.0.4:*:*:*:*:*:*:*","matchCriteriaId":"4B1ED2E6-F12C-4C15-BC75-202618C5E43D"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0051.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1115","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4975","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0051.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4975","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0253","sourceIdentifier":"cve@mitre.org","published":"2000-04-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The dansie shopping cart application cart.pl allows remote attackers to modify sensitive purchase information via hidden form fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:craig_dansie:dansie_shopping_cart:3.0.4:*:*:*:*:*:*:*","matchCriteriaId":"4B1ED2E6-F12C-4C15-BC75-202618C5E43D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1115","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4621","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4621","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0258","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.0 and 5.0 allows remote attackers to cause a denial of service by sending many URLs with a large number of escaped characters, aka the \"Myriad Escaped Characters\" Vulnerability."},{"lang":"es","value":"IIS 4.0 y 5.0 permite a atacantes remotos provocar una denegación de servicio enviando muchas URLs con un largo número de caracteres de escape, también conocida como la Vulnerabilidad \"Myriad Escaped Characters\"."}],"metrics":{"cvssMetricV30":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1101","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-023","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1101","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-023","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0259","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default permissions for the Cryptography\\Offload registry key used by the OffloadModExpo in Windows NT 4.0 allows local users to obtain compromise the cryptographic keys of other users."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1105","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-024","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1105","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-024","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0261","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The AVM KEN! web server allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:avm:ken:1.3.10:*:*:*:*:*:*:*","matchCriteriaId":"1D6F4F7C-2905-46E9-AFA9-CBAC56A5809A"},{"vulnerable":true,"criteria":"cpe:2.3:a:avm:ken:1.4.30:*:*:*:*:*:*:*","matchCriteriaId":"00DBCDEA-5443-493C-B7D1-2789794E8711"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1282","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1103","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root%40web305-mc.mail.com","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1282","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root%40web305-mc.mail.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0262","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The AVM KEN! ISDN Proxy server allows remote attackers to cause a denial of service via a malformed request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:avm:ken:1.3.10:*:*:*:*:*:*:*","matchCriteriaId":"1D6F4F7C-2905-46E9-AFA9-CBAC56A5809A"},{"vulnerable":true,"criteria":"cpe:2.3:a:avm:ken:1.4.30:*:*:*:*:*:*:*","matchCriteriaId":"00DBCDEA-5443-493C-B7D1-2789794E8711"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1103","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root%40web305-mc.mail.com","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0073.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1103","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=383085010.956159226625.JavaMail.root%40web305-mc.mail.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0282","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"TalentSoft webpsvr daemon in the Web+ shopping cart application allows remote attackers to read arbitrary files via a .. (dot dot) attack on the webplus CGI program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:talentsoft:web\\+:4:*:*:*:*:*:*:*","matchCriteriaId":"4329D0DC-6FB0-44E1-8FFE-9364A0540542"}]}]}],"references":[{"url":"ftp://ftp.talentsoft.com/Download/Webplus/Unix/Patches/Webplus46p%20Read%20me.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0050.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1102","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"ftp://ftp.talentsoft.com/Download/Webplus/Unix/Patches/Webplus46p%20Read%20me.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0050.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1102","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0283","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default installation of IRIX Performance Copilot allows remote attackers to access sensitive system information via the pmcd daemon."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:P","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0ECE564D-B4BB-4C05-88CC-CDC3F8E4E366"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*","matchCriteriaId":"B2D59247-56FA-46B4-BB51-2DAE71AFC145"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*","matchCriteriaId":"15BE08F8-5F3F-45DB-BFE0-1F6F2F57A4D4"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"E6B2E6D1-8C2D-4E15-A6BB-E4FE878ED1E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3f:*:*:*:*:*:*:*","matchCriteriaId":"8D51EC29-8836-4F87-ABF8-FF7530DECBB1"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.3m:*:*:*:*:*:*:*","matchCriteriaId":"518B7253-7B0F-4A0A-ADA7-F3E3B5AAF877"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.4:*:*:*:*:*:*:*","matchCriteriaId":"440B7208-34DB-4898-8461-4E703F7EDFB7"},{"vulnerable":true,"criteria":"cpe:2.3:o:sgi:irix:6.5.6:*:*:*:*:*:*:*","matchCriteriaId":"D07AA144-6FD7-4C80-B4F2-D21C1AFC864A"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0056.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1106","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0056.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1106","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0287","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The BizDB CGI script bizdb-search.cgi allows remote attackers to execute arbitrary commands via shell metacharacters in the dbname parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cnc:technology_bizdb:1.0:*:*:*:*:*:*:*","matchCriteriaId":"3B534A23-7E20-4F79-97D6-13D4975F2AC3"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0058.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1104","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0058.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1104","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0288","sourceIdentifier":"cve@mitre.org","published":"2000-04-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Infonautics getdoc.cgi allows remote attackers to bypass the payment phase for accessing documents via a modified form variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0049.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0049.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0250","sourceIdentifier":"cve@mitre.org","published":"2000-04-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The crypt function in QNX uses weak encryption, which allows local users to decrypt passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qnx:qnx:4.25a:*:*:*:*:*:*:*","matchCriteriaId":"103982C9-A49A-4CF0-A24E-2E6ADCEEDBFD"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0072.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1114","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0072.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1114","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0254","sourceIdentifier":"cve@mitre.org","published":"2000-04-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The dansie shopping cart application cart.pl allows remote attackers to obtain the shopping cart database and configuration information via a URL that references either the env, db, or vars form variables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:craig_dansie:dansie_shopping_cart:3.0.4:*:*:*:*:*:*:*","matchCriteriaId":"4B1ED2E6-F12C-4C15-BC75-202618C5E43D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1115","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4954","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1115","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4954","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0260","sourceIdentifier":"cve@mitre.org","published":"2000-04-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the dvwssr.dll DLL in Microsoft Visual Interdev 1.0 allows users to cause a denial of service or execute commands, aka the \"Link View Server-Side Component\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*","matchCriteriaId":"0951E183-2BFE-4B19-9F06-107B5E22DBC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_interdev:1.0:*:*:*:*:*:*:*","matchCriteriaId":"A8056FB5-2B2B-416B-AC5F-35EE4CA59F36"}]}]}],"references":[{"url":"http://www.osvdb.org/282","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1109","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-025","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/282","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1109","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-025","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-1218","sourceIdentifier":"cve@mitre.org","published":"2000-04-14T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration for the domain name resolver for Microsoft Windows 98, NT 4.0, 2000, and XP sets the QueryIpMatching parameter to 0, which causes Windows to accept DNS updates from hosts that it did not query, which allows remote attackers to poison the DNS cache."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-346"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:-:*:*:*:*:*:*:*","matchCriteriaId":"685F1981-EA61-4A00-89F8-A748A88962F8"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:-:*:*:*:*:*:*:*","matchCriteriaId":"40FC681A-7B85-4495-8DCC-C459FE7E2F13"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98se:-:*:*:*:*:*:*:*","matchCriteriaId":"A2354216-8103-49F9-A95C-7DE4F738BBEE"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_xp:-:*:*:*:*:*:*:*","matchCriteriaId":"B47EBFCC-1828-45AB-BC6D-FB980929A81A"}]}]}],"references":[{"url":"http://www.kb.cert.org/vuls/id/458659","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4280","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.kb.cert.org/vuls/id/458659","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4280","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-2000-0263","sourceIdentifier":"cve@mitre.org","published":"2000-04-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The X font server xfs in Red Hat Linux 6.x allows an attacker to cause a denial of service via a malformed request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*","matchCriteriaId":"6931FB54-A163-4CE3-BBD9-D345AA0977A6"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*","matchCriteriaId":"5ABD1331-277C-4C31-8186-978243C62255"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*","matchCriteriaId":"C89454B9-4F45-4A42-A06D-ED42D893C544"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*","matchCriteriaId":"1E64093E-7D53-4238-95C3-48ED5A0FFD97"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1111","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1111","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0284","sourceIdentifier":"cve@mitre.org","published":"2000-04-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in University of Washington imapd version 4.7 allows users with a valid account to execute commands via LIST or other commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:university_of_washington:imap:12.264:*:*:*:*:*:*:*","matchCriteriaId":"22F0C6F3-A9B5-4001-99CF-C8297735D86F"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0074.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0085.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1110","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0074.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0085.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1110","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0285","sourceIdentifier":"cve@mitre.org","published":"2000-04-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in XFree86 3.3.x allows local users to execute arbitrary commands via a long -xkbmap parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:x11r6:3.3.6:*:*:*:*:*:*:*","matchCriteriaId":"0946A224-6A0C-4DE3-89F9-200682431737"},{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:x11r6:4.0:*:*:*:*:*:*:*","matchCriteriaId":"F33E5444-E178-4F49-BDA1-DE576D8526EE"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0076.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1306","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0076.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1306","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0286","sourceIdentifier":"cve@mitre.org","published":"2000-04-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"X fontserver xfs allows local users to cause a denial of service via malformed input to the server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:alpha:*:*:*:*:*","matchCriteriaId":"6931FB54-A163-4CE3-BBD9-D345AA0977A6"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:sparc:*:*:*:*:*","matchCriteriaId":"5ABD1331-277C-4C31-8186-978243C62255"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*","matchCriteriaId":"C89454B9-4F45-4A42-A06D-ED42D893C544"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*","matchCriteriaId":"1E64093E-7D53-4238-95C3-48ED5A0FFD97"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1111","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0079.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1111","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0291","sourceIdentifier":"cve@mitre.org","published":"2000-04-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Star Office 5.1 allows attackers to cause a denial of service by embedding a long URL within a document."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sun:staroffice:5.1:*:*:*:*:*:*:*","matchCriteriaId":"7C93C6E1-EF21-4CAA-96EC-780BDDA33488"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0077.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1112","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0077.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1112","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0264","sourceIdentifier":"cve@mitre.org","published":"2000-04-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Panda Security 3.0 with registry editing disabled allows users to edit the registry and gain privileges by directly executing a .reg file or using other methods."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:panda:panda_security:3.0:*:*:*:*:*:*:*","matchCriteriaId":"03C5DC7E-F0EA-4C33-BF61-7698FD12F69A"}]}]}],"references":[{"url":"http://updates.pandasoftware.com/docs/us/Avoidvulnerability.zip","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1119","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FB45F2.550EA000%40teleline.es","source":"cve@mitre.org"},{"url":"http://updates.pandasoftware.com/docs/us/Avoidvulnerability.zip","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1119","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FB45F2.550EA000%40teleline.es","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0265","sourceIdentifier":"cve@mitre.org","published":"2000-04-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Panda Security 3.0 allows users to uninstall the Panda software via its Add/Remove Programs applet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:panda:panda_security:3.0:*:*:*:*:*:*:*","matchCriteriaId":"03C5DC7E-F0EA-4C33-BF61-7698FD12F69A"}]}]}],"references":[{"url":"http://updates.pandasoftware.com/docs/us/Avoidvulnerability.zip","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1119","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FB45F2.550EA000%40teleline.es","source":"cve@mitre.org"},{"url":"http://updates.pandasoftware.com/docs/us/Avoidvulnerability.zip","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1119","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FB45F2.550EA000%40teleline.es","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0083","sourceIdentifier":"cve@mitre.org","published":"2000-04-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP asecure creates the Audio Security File audio.sec with insecure permissions, which allows local users to cause a denial of service or gain additional privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10:*:*:*:*:*:*:*","matchCriteriaId":"CC96D014-7CE2-4F61-BBAF-507829C542EA"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11:*:*:*:*:*:*:*","matchCriteriaId":"87FB80D8-1BE7-46F7-9F7E-B7DA88D039F8"}]}]}],"references":[{"url":"http://www.securityfocus.com/templates/advisory.html?id=2031","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2031","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0266","sourceIdentifier":"cve@mitre.org","published":"2000-04-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 5.01 allows remote attackers to bypass the cross frame security policy via a malicious applet that interacts with the Java JSObject to modify the DOM properties to set the IFRAME to an arbitrary Javascript URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*","matchCriteriaId":"6219D36E-9E2C-4DC7-8FD5-FAD144A333F6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1121","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FC6130.D6D178FD%40nat.bg","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1121","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=38FC6130.D6D178FD%40nat.bg","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0269","sourceIdentifier":"cve@mitre.org","published":"2000-04-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Emacs 20 does not properly set permissions for a slave PTY device when starting a new subprocess, which allows local users to read or modify communications between Emacs and the subprocess."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*","matchCriteriaId":"E460F3A1-71DD-4A37-9F17-6B4E5C9A46AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*","matchCriteriaId":"0F9D5B3C-7534-4DC6-BE44-91A0031FBA6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*","matchCriteriaId":"4EB2E29F-371A-43AB-8CBF-DDFABDB103BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*","matchCriteriaId":"05F6124D-F3C1-4E4C-B580-85AB01833885"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*","matchCriteriaId":"9571E866-AB82-4B95-8097-ED0DA038331F"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*","matchCriteriaId":"3A773690-9650-40E1-BCE3-7E020AF61BCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*","matchCriteriaId":"26D9A554-CB40-461D-9C95-78051B0CA354"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1125","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=tg4s8zioxq.fsf%40mercury.rus.uni-stuttgart.de","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1125","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=tg4s8zioxq.fsf%40mercury.rus.uni-stuttgart.de","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0270","sourceIdentifier":"cve@mitre.org","published":"2000-04-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The make-temp-name Lisp function in Emacs 20 creates temporary files with predictable names, which allows attackers to conduct a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*","matchCriteriaId":"E460F3A1-71DD-4A37-9F17-6B4E5C9A46AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*","matchCriteriaId":"0F9D5B3C-7534-4DC6-BE44-91A0031FBA6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*","matchCriteriaId":"4EB2E29F-371A-43AB-8CBF-DDFABDB103BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*","matchCriteriaId":"05F6124D-F3C1-4E4C-B580-85AB01833885"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*","matchCriteriaId":"9571E866-AB82-4B95-8097-ED0DA038331F"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*","matchCriteriaId":"3A773690-9650-40E1-BCE3-7E020AF61BCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*","matchCriteriaId":"26D9A554-CB40-461D-9C95-78051B0CA354"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1126","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=tg4s8zioxq.fsf%40mercury.rus.uni-stuttgart.de","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1126","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=tg4s8zioxq.fsf%40mercury.rus.uni-stuttgart.de","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0271","sourceIdentifier":"cve@mitre.org","published":"2000-04-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"read-passwd and other Lisp functions in Emacs 20 do not properly clear the history of recently typed keys, which allows an attacker to read unencrypted passwords."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.0:*:*:*:*:*:*:*","matchCriteriaId":"E460F3A1-71DD-4A37-9F17-6B4E5C9A46AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.1:*:*:*:*:*:*:*","matchCriteriaId":"0F9D5B3C-7534-4DC6-BE44-91A0031FBA6C"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.2:*:*:*:*:*:*:*","matchCriteriaId":"4EB2E29F-371A-43AB-8CBF-DDFABDB103BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.3:*:*:*:*:*:*:*","matchCriteriaId":"05F6124D-F3C1-4E4C-B580-85AB01833885"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.4:*:*:*:*:*:*:*","matchCriteriaId":"9571E866-AB82-4B95-8097-ED0DA038331F"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.5:*:*:*:*:*:*:*","matchCriteriaId":"3A773690-9650-40E1-BCE3-7E020AF61BCD"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:emacs:20.6:*:*:*:*:*:*:*","matchCriteriaId":"26D9A554-CB40-461D-9C95-78051B0CA354"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1125","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=tg4s8zioxq.fsf%40mercury.rus.uni-stuttgart.de","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1125","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&date=2000-04-15&msg=tg4s8zioxq.fsf%40mercury.rus.uni-stuttgart.de","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0256","sourceIdentifier":"cve@mitre.org","published":"2000-04-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in htimage.exe and Imagemap.exe in FrontPage 97 and 98 Server Extensions allow a user to conduct activities that are not otherwise available through the web site, aka the \"Server-Side Image Map Components\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*","matchCriteriaId":"0951E183-2BFE-4B19-9F06-107B5E22DBC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:personal_web_server:2.0:*:*:*:*:*:*:*","matchCriteriaId":"7FF19563-8E22-4DDC-948D-6F97975745EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.securityfocus.com/archive/1/470458/100/0/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1117","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-028","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34720","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/470458/100/0/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1117","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-028","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34720","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0257","sourceIdentifier":"cve@mitre.org","published":"2000-04-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the NetWare remote web administration utility allows remote attackers to cause a denial of service or execute commands via a long URL."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:novell:netware:5.1:*:*:*:*:*:*:*","matchCriteriaId":"455ED4E4-8033-4043-BF10-20188BF0B8B6"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1118","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0004171825340.10088-100000%40nimue.tpi.pl","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1118","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0004171825340.10088-100000%40nimue.tpi.pl","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0292","sourceIdentifier":"cve@mitre.org","published":"2000-04-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Adtran MX2800 M13 Multiplexer allows remote attackers to cause a denial of service via a ping flood to the Ethernet interface, which causes the device to crash."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:adtran:mx2800:m13:*:*:*:*:*:*:*","matchCriteriaId":"C26D11D0-3C0D-4072-8EF4-6806CE598767"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1129","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10004190908140.32750-100000%40localhost.localdomain","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1129","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.10.10004190908140.32750-100000%40localhost.localdomain","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0267","sourceIdentifier":"cve@mitre.org","published":"2000-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco Catalyst 5.4.x allows a user to gain access to the \"enable\" mode without a password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:catos:5.4\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"F1D952CE-9CDE-442D-8544-4614DBE5AC12"}]}]}],"references":[{"url":"http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.osvdb.org/1288","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1122","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/707/catos-enable-bypass-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.osvdb.org/1288","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1122","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0268","sourceIdentifier":"cve@mitre.org","published":"2000-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cisco IOS 11.x and 12.x allows remote attackers to cause a denial of service by sending the ENVIRON option to the Telnet daemon before it is ready to accept it, which causes the system to reboot."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*","matchCriteriaId":"D8783C0A-990A-4B79-8BF9-64E425DA585E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*","matchCriteriaId":"77DDC99D-8B73-452C-94A7-A9A48F2F379B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*","matchCriteriaId":"5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*","matchCriteriaId":"C48466C4-5A1E-4C71-8822-32D387B36B8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*","matchCriteriaId":"08E23131-D207-4D98-96D5-2B71FF792604"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*","matchCriteriaId":"1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*","matchCriteriaId":"E7109585-1433-4940-B7C9-C561DEAF1498"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*","matchCriteriaId":"1A0D82E1-CCF7-429B-A637-479E839EAE3C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*","matchCriteriaId":"E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*","matchCriteriaId":"4F1B2747-4A9C-44FC-BBA8-39E338B30417"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*","matchCriteriaId":"D5BB7513-C232-4B4F-BE68-972B05086ABD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*","matchCriteriaId":"ECCE69A3-41C6-4893-86D4-7F264352C8A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*","matchCriteriaId":"FA654CE6-82C3-43D0-BAED-70E88A740BF1"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:accesspath:ls-3:*:*:*:*:*:*:*","matchCriteriaId":"7D8CD3D5-C52F-4B38-8DA7-5441B7CD000D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:accesspath:ts-3:*:*:*:*:*:*:*","matchCriteriaId":"1DD96A21-1862-4E35-BD02-2928DD44B3C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:accesspath:vs-3:*:*:*:*:*:*:*","matchCriteriaId":"D537F5F7-8227-46CC-A30F-B81C25AD9FA3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:as5200:*:*:*:*:*:*:*:*","matchCriteriaId":"6E74902A-1785-40FE-92A0-55BD27D6FEC3"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:as5300:*:*:*:*:*:*:*:*","matchCriteriaId":"883975E5-FE8B-4DC4-8F71-E68791ABD17D"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:as5800:*:*:*:*:*:*:*:*","matchCriteriaId":"823E4E18-8719-4167-83BE-CF2DA55558E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:cisco:system_controller_3640:*:*:*:*:*:*:*:*","matchCriteriaId":"B7C0CC3E-3E01-4607-BE75-4A6A1074DC82"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:voice_gateway_as5800:*:*:*:*:*:*:*:*","matchCriteriaId":"9D185F2F-788C-44F1-A635-90E33A4A88B9"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:3660_router:*:*:*:*:*:*:*:*","matchCriteriaId":"5EAE468C-7D0F-4F6D-B598-B2E422EFDCD5"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:7100_router:*:*:*:*:*:*:*:*","matchCriteriaId":"C3715102-E348-457A-9546-94BBCEF91A00"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:7200_router:*:*:*:*:*:*:*:*","matchCriteriaId":"60DEA083-B9BC-42DB-A4F7-986A5A185DE6"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:7500_router:*:*:*:*:*:*:*:*","matchCriteriaId":"FCFAA111-F831-4BC9-BCD7-246ED6C0F3FF"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:ubr7200:*:*:*:*:*:*:*:*","matchCriteriaId":"0B4917DF-B485-46A3-9515-8BDDD1F13C77"}]}]}],"references":[{"url":"http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1289","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1123","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/707/iostelnetopt-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1289","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1123","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0272","sourceIdentifier":"cve@mitre.org","published":"2000-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"RealNetworks RealServer allows remote attackers to cause a denial of service by sending malformed input to the server at port 7070."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:7.0:*:*:*:*:*:*:*","matchCriteriaId":"9392C48A-A1AB-43F7-8374-02BDCE6589AC"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:basic:*:*:*:*:*:*:*","matchCriteriaId":"E0C507DD-95ED-48D1-AA74-7BE15A4259FC"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:g2_1.0:*:*:*:*:*:*:*","matchCriteriaId":"EFCC35BE-D76A-48CF-84B7-EF4A3681F15F"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:intranet:*:*:*:*:*:*:*","matchCriteriaId":"47455BB6-F5B4-4EC3-AD03-6DB17FC02BCB"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:plus:*:*:*:*:*:*:*","matchCriteriaId":"BDA39DE5-C08F-493D-A5C0-68761388B0AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:realnetworks:realserver:pro:*:*:*:*:*:*:*","matchCriteriaId":"43F75E54-9B53-48B3-95E9-125E74E9C54C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95625288231045&w=2","source":"cve@mitre.org"},{"url":"http://service.real.com/help/faq/servg270.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1128","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=95625288231045&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://service.real.com/help/faq/servg270.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1128","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0311","sourceIdentifier":"cve@mitre.org","published":"2000-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Windows 2000 domain controller allows a malicious user to modify Active Directory information by modifying an unprotected attribute, aka the \"Mixed Object Access\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1145","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-026","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1145","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-026","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0331","sourceIdentifier":"cve@mitre.org","published":"2000-04-20T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Microsoft command processor (CMD.EXE) for Windows NT and Windows 2000 allows a local user to cause a denial of service via a long environment variable, aka the \"Malformed Environment Variable\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0147.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1135","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-027","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0147.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1135","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-027","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0295","sourceIdentifier":"cve@mitre.org","published":"2000-04-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in LCDproc allows remote attackers to gain root privileges via the screen_add command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lcdproc:lcdproc:0.4:*:*:*:*:*:*:*","matchCriteriaId":"288E218A-A047-4840-B782-97458F1A2ED6"}]}]}],"references":[{"url":"http://secunia.com/advisories/7829","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/archive/1/305589/30/26390/threaded","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1131","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000421010946.15318I-200000%40schizo.strange.net","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4315","source":"cve@mitre.org"},{"url":"http://secunia.com/advisories/7829","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/archive/1/305589/30/26390/threaded","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1131","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000421010946.15318I-200000%40schizo.strange.net","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4315","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0318","sourceIdentifier":"cve@mitre.org","published":"2000-04-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Atrium Mercur Mail Server 3.2 allows local attackers to read other user's email and create arbitrary files via a dot dot (..) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:mercur_mailserver:3.2:*:*:*:*:*:*:*","matchCriteriaId":"2C1C96FB-D121-4097-8838-B88C6F87E63A"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0057.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1144","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0057.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1144","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0320","sourceIdentifier":"cve@mitre.org","published":"2000-04-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Qpopper 2.53 and 3.0 does not properly identify the \\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 1023 characters long and ends in \\n."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:2.53:*:*:*:*:*:*:*","matchCriteriaId":"B223F362-D00F-4D93-8328-33FF1CE331EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:3.0:*:*:*:*:*:*:*","matchCriteriaId":"B1208414-D175-41E2-BCBC-9E5EDBC41FFD"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*","matchCriteriaId":"0C1E1872-D16C-4848-800C-32B80DD59494"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1133","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421%40SECURITY.NNOV.RU","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1133","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=9763.000421%40SECURITY.NNOV.RU","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0336","sourceIdentifier":"cve@mitre.org","published":"2000-04-21T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux OpenLDAP server allows local users to modify arbitrary files via a symlink attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:openldap:openldap:1.2.7:*:*:*:*:*:*:*","matchCriteriaId":"AC07AD0D-5DF9-41A4-8592-CEFF1842355D"},{"vulnerable":true,"criteria":"cpe:2.3:a:openldap:openldap:1.2.8:*:*:*:*:*:*:*","matchCriteriaId":"30017C56-42A9-4AF9-B5B3-7357E424F837"},{"vulnerable":true,"criteria":"cpe:2.3:a:openldap:openldap:1.2.9:*:*:*:*:*:*:*","matchCriteriaId":"C8A51F38-3F5A-4F6D-93EE-776B5C2FF48F"},{"vulnerable":true,"criteria":"cpe:2.3:a:openldap:openldap:1.2.10:*:*:*:*:*:*:*","matchCriteriaId":"8DBEC27E-3220-42CE-B6CC-675F387CB506"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"ACAAD334-2CA7-4B3B-BA25-302E7610BC2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"E4853E92-5E0A-47B9-A343-D5BEE87D2C27"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:alpha:*:*:*:*:*","matchCriteriaId":"C89454B9-4F45-4A42-A06D-ED42D893C544"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:i386:*:*:*:*:*","matchCriteriaId":"B72D6205-DFA4-41D9-B3B6-0B7DA756CD8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:sparc:*:*:*:*:*","matchCriteriaId":"1E64093E-7D53-4238-95C3-48ED5A0FFD97"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"5D15A193-3E01-467C-AEAD-497F4600DB06"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"F7C765FF-0A3D-4BF4-B236-609658776ACA"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"C6619B49-8A89-4600-A47F-A39C8BF54259"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-012.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1232","source":"cve@mitre.org"},{"url":"http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-009.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-012.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1232","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.turbolinux.com/pipermail/tl-security-announce/2000-May/000009.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0458","sourceIdentifier":"cve@mitre.org","published":"2000-04-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The MSWordView application in IMP creates world-readable files in the /tmp directory, which allows other local users to read potentially sensitive information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"F0F032E4-518E-43A7-926D-CB7F9F702330"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.0.10:*:*:*:*:*:*:*","matchCriteriaId":"D4188591-6049-4184-88B4-63EF708C7A16"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"382BE04C-F526-4450-9E5E-CA5BB98DD145"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.2_pre9:*:*:*:*:*:*:*","matchCriteriaId":"439EC501-2922-42BA-86A7-235F9E8CDF08"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.2_pre10:*:*:*:*:*:*:*","matchCriteriaId":"694CE5EF-9FF9-42B9-AE2F-8FEF039794C0"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95672120116627&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1360","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95672120116627&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1360","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0459","sourceIdentifier":"cve@mitre.org","published":"2000-04-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IMP does not remove files properly if the MSWordView application quits, which allows local users to cause a denial of service by filling up the disk space by requesting a large number of documents and prematurely stopping the request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.0.9:*:*:*:*:*:*:*","matchCriteriaId":"F0F032E4-518E-43A7-926D-CB7F9F702330"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.0.10:*:*:*:*:*:*:*","matchCriteriaId":"D4188591-6049-4184-88B4-63EF708C7A16"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.0.11:*:*:*:*:*:*:*","matchCriteriaId":"382BE04C-F526-4450-9E5E-CA5BB98DD145"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.2_pre9:*:*:*:*:*:*:*","matchCriteriaId":"439EC501-2922-42BA-86A7-235F9E8CDF08"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.2_pre10:*:*:*:*:*:*:*","matchCriteriaId":"694CE5EF-9FF9-42B9-AE2F-8FEF039794C0"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.2_pre11:*:*:*:*:*:*:*","matchCriteriaId":"A8A4A17F-2363-489B-89B4-0B8FD1FCC3AE"},{"vulnerable":true,"criteria":"cpe:2.3:a:imp:imp:2.2_pre12:*:*:*:*:*:*:*","matchCriteriaId":"1B1A3F7C-C795-45F6-BC6A-FB591D287287"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95672120116627&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1361","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95672120116627&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1361","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0319","sourceIdentifier":"cve@mitre.org","published":"2000-04-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"mail.local in Sendmail 8.10.x does not properly identify the .\\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 2047 characters long and ends in .\\n."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:5.58:*:*:*:*:*:*:*","matchCriteriaId":"1D07F493-9C8D-44A4-8652-F28B46CBA27C"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:5.59:*:*:*:*:*:*:*","matchCriteriaId":"B8863BB7-833C-462F-BF5F-B27761B05E6F"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.6.x:*:*:*:*:*:*:*","matchCriteriaId":"11C2CB74-F51B-40B9-8008-5EAEA9E8F896"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.1:*:*:*:*:*:*:*","matchCriteriaId":"C2D488B8-49D0-4AFD-A5C1-63CB036E3886"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.2:*:*:*:*:*:*:*","matchCriteriaId":"A3E2EE58-BCAD-4F26-94B6-F91CF1731429"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.3:*:*:*:*:*:*:*","matchCriteriaId":"10AC2FAD-C4AD-46DD-88D1-4F99433B3476"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.4:*:*:*:*:*:*:*","matchCriteriaId":"3B730F70-5662-4BE4-8202-93E12620CBD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.5:*:*:*:*:*:*:*","matchCriteriaId":"FA6D5E9F-275F-41EB-9707-6B7F129A700F"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.6:*:*:*:*:*:*:*","matchCriteriaId":"02C8FAE4-24FF-49E3-A0D5-A94EBCC80EF4"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.7.x:*:*:*:*:*:*:*","matchCriteriaId":"94C2D541-2E53-44F1-A891-D601F402E1B8"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8:*:*:*:*:*:*:*","matchCriteriaId":"C973CF06-BEE8-4D79-8649-1510E9EFC29D"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.1:*:*:*:*:*:*:*","matchCriteriaId":"56D2BAF2-F430-41A1-8DEE-1D9CB2A56C32"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.2:*:*:*:*:*:*:*","matchCriteriaId":"5E36E877-6028-49DE-8B2E-3087A141F8EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.3:*:*:*:*:*:*:*","matchCriteriaId":"9D8484F8-8712-4B55-A163-BA492B4D0095"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.4:*:*:*:*:*:*:*","matchCriteriaId":"D15777E6-6951-4559-B19F-08CE6246BF33"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.5:*:*:*:*:*:*:*","matchCriteriaId":"5ADBDC99-E03C-42FC-9A97-133D45FF4810"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.8.x:*:*:*:*:*:*:*","matchCriteriaId":"8A712A7D-1E91-4FE7-A871-5DF20F441198"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.9.1:*:*:*:*:*:*:*","matchCriteriaId":"F81633D9-456A-4377-93F5-E294146FF2D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:eric_allman:sendmail:8.9.3:*:*:*:*:*:*:*","matchCriteriaId":"D4273E93-B536-4B2C-8DAD-84A6F5E38890"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1146","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=2694.000424%40SECURITY.NNOV.RU","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1146","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=2694.000424%40SECURITY.NNOV.RU","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0338","sourceIdentifier":"cve@mitre.org","published":"2000-04-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Concurrent Versions Software (CVS) uses predictable temporary file names for locking, which allows local users to cause a denial of service by creating the lock directory before it is created for use by a legitimate CVS user."}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H","baseScore":5.5,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":1.8,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-667"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:concurrent_versions_software_project:concurrent_versions_software:-:*:*:*:*:*:*:*","matchCriteriaId":"BB12A3F8-D509-4EC0-86F0-A832C4D1AE57"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1136","source":"cve@mitre.org","tags":["Broken Link","Exploit","Patch","Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D20000423174038.A520%40clico.pl","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/bid/1136","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Exploit","Patch","Third Party Advisory","VDB Entry","Vendor Advisory"]},{"url":"http://www.securityfocus.com/frames/?content=/templates/archive.pike%3Flist%3D1%26msg%3D20000423174038.A520%40clico.pl","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-2000-0248","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The web GUI for the Linux Virtual Server (LVS) software in the Red Hat Linux Piranha package has a backdoor password that allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://xforce.iss.net/alerts/advise46.php3","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://xforce.iss.net/alerts/advise46.php3","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0316","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris 7 lp allows local users to gain root privileges via a long -d option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0191.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1143","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0191.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1143","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0317","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris 7 lpset allows local users to gain root privileges via a long -r option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0192.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0236.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=95729763119559&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1138","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0192.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0236.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://marc.info/?l=bugtraq&m=95729763119559&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1138","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0321","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in IC Radius package allows a remote attacker to cause a denial of service via a long user name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:icradius:icradius:0.14:*:*:*:*:*:*:*","matchCriteriaId":"2A28A174-45A4-4886-8C87-2D475F9ABF18"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0190.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1147","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0190.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1147","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0322","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The passwd.php3 CGI script in the Red Hat Piranha Virtual Server Package allows local users to execute arbitrary commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://www.redhat.com/support/errata/RHSA-2000-014.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1149","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Enip.BSO.23.0004241601140.28851-100000%40www.whitehats.com","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-014.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1149","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Enip.BSO.23.0004241601140.28851-100000%40www.whitehats.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0334","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Allaire Spectra container editor preview tool does not properly enforce object security, which allows an attacker to conduct unauthorized activities via an object-method that is added to the container object with a publishing rule."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:spectra:1.0:*:*:*:*:*:*:*","matchCriteriaId":"C7218A9E-7AA1-4536-967B-72B37B03C9C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:spectra:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42D8A283-08F2-4F40-AA94-FDE57403DE02"}]}]}],"references":[{"url":"http://www.allaire.com/handlers/index.cfm?ID=15411&Method=Full","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1181","source":"cve@mitre.org"},{"url":"http://www.allaire.com/handlers/index.cfm?ID=15411&Method=Full","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1181","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0337","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Xsun X server in Solaris 7 allows local users to gain root privileges via a long -dev parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*","matchCriteriaId":"1894C542-AA81-40A9-BF47-AE24C93C1ACB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","matchCriteriaId":"A2475113-CFE4-41C8-A86F-F2DA6548D224"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0188.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1140","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0188.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1140","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0339","sourceIdentifier":"cve@mitre.org","published":"2000-04-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ZoneAlarm 2.1.10 and earlier does not filter UDP packets with a source port of 67, which allows remote attackers to bypass the firewall rules."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zonelabs:zonealarm:*:*:*:*:*:*:*:*","versionEndIncluding":"2.2.10","matchCriteriaId":"90AB2A1E-E48F-478B-91A3-0F37DD4F152C"}]}]}],"references":[{"url":"http://www.osvdb.org/1294","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1137","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000421044123.2353.qmail%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1294","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1137","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000421044123.2353.qmail%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0324","sourceIdentifier":"cve@mitre.org","published":"2000-04-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"pcAnywhere 8.x and 9.0 allows remote attackers to cause a denial of service via a TCP SYN scan, e.g. by nmap."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:8.0.1:*:*:*:*:*:*:*","matchCriteriaId":"B543CCFB-954B-4CCF-8BB7-E64DAFA0C1F9"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:8.0.2:*:*:*:*:*:*:*","matchCriteriaId":"09E5DA00-5FDC-42DE-955B-E977E62A2B69"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:9.0:*:*:*:*:*:*:*","matchCriteriaId":"CB0C7336-52DC-4E0D-9F6F-9B401B0A93EB"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:pcanywhere:9.2:*:*:*:*:*:*:*","matchCriteriaId":"DFDF9CE6-93A7-49EC-B6B5-428C7517E902"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html","source":"cve@mitre.org"},{"url":"http://www.iss.net/security_center/static/4347.php","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1301","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1150","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-02/0201.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2001-02/0258.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.iss.net/security_center/static/4347.php","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1301","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1150","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.3.96.1000425150157.13567A-100000%40sword.damocles.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0326","sourceIdentifier":"cve@mitre.org","published":"2000-04-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Meeting Maker uses weak encryption (a polyalphabetic substitution cipher) for passwords, which allows remote attackers to sniff and decrypt passwords for Meeting Maker accounts."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:on_technology:meeting_maker:1.0:*:*:*:*:*:*:*","matchCriteriaId":"39128C71-4023-4E97-974E-B6B1AD71E5F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:on_technology:meeting_maker:2.0:*:*:*:*:*:*:*","matchCriteriaId":"6DBC91CD-6D87-446A-A872-6860DE947C5D"},{"vulnerable":true,"criteria":"cpe:2.3:a:on_technology:meeting_maker:3.0:*:*:*:*:*:*:*","matchCriteriaId":"18D9F60D-1382-498B-832E-C5F07DE6AD0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:on_technology:meeting_maker:4.0:*:*:*:*:*:*:*","matchCriteriaId":"9A79A030-A4E3-40A4-A7CE-11263D61C94D"},{"vulnerable":true,"criteria":"cpe:2.3:a:on_technology:meeting_maker:5.0:*:*:*:*:*:*:*","matchCriteriaId":"6C0C323E-8071-4B3C-98AF-1C0A3175CC3C"},{"vulnerable":true,"criteria":"cpe:2.3:a:on_technology:meeting_maker:6.0:*:*:*:*:*:*:*","matchCriteriaId":"A1D6D755-ED32-4BF1-A4BF-08BF4A230A30"}]}]}],"references":[{"url":"http://support.on.com/support/mmxp.nsf/31af51e08bcc93eb852565a90056138b/11af70407a16b165852568c50056a952?OpenDocument","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1151","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://support.on.com/support/mmxp.nsf/31af51e08bcc93eb852565a90056138b/11af70407a16b165852568c50056a952?OpenDocument","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1151","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0249","sourceIdentifier":"cve@mitre.org","published":"2000-04-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The AIX Fast Response Cache Accelerator (FRCA) allows local users to modify arbitrary files via the configuration capability in the frcactrl program."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"55919E74-09E7-44BA-9941-D1B69BB1692F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1152","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/alerts/advise47.php3","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1152","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/alerts/advise47.php3","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0380","sourceIdentifier":"cve@mitre.org","published":"2000-04-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The IOS HTTP service in Cisco routers and switches running IOS 11.1 through 12.1 allows remote attackers to cause a denial of service by requesting a URL that contains a %% string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:N/I:N/A:C","baseScore":7.1,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*","matchCriteriaId":"82B6315D-7BEF-419F-9B93-3CF669E986D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*","matchCriteriaId":"E8026B11-6144-467F-8094-F4F73CD37526"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*","matchCriteriaId":"17DE2319-19D9-4C02-80B4-0A6AAD853867"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*","matchCriteriaId":"82BFEABB-6E90-4A24-BBE3-2BDB524028A0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*","matchCriteriaId":"F169E322-3D72-4F86-BD5F-74589E5DD823"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*","matchCriteriaId":"047F9781-38B8-488C-B999-A3CA6BDB639C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*","matchCriteriaId":"3E3586C0-64AF-4584-8F56-7E0756B4A521"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*","matchCriteriaId":"9B784C9F-79EE-4D08-9D03-985EC7E378FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*","matchCriteriaId":"FFBA8825-442E-4CAD-A9B2-4DD8546F35F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*","matchCriteriaId":"F106D24F-7EDD-4A52-9A3A-F25E6EEC1870"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*","matchCriteriaId":"0DC1411B-4E7E-4F57-B025-9FE27B09C7AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3:*:*:*:*:*:*:*","matchCriteriaId":"33CCFFC6-9D26-4C39-AF76-0B8FCDE743CF"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*","matchCriteriaId":"2A6F8329-15C7-4FED-A61D-5AF4F3A33976"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*","matchCriteriaId":"CD13732A-DAE0-4D5B-9DAC-6D2CF391220D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*","matchCriteriaId":"A53DE80A-5865-4514-BE14-BA5992EE7BDA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.3t:*:*:*:*:*:*:*","matchCriteriaId":"655BB9C1-BA90-452E-A9C8-9B1E15B99650"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","matchCriteriaId":"8F86F790-6247-42F2-9487-3D60A2842F52"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*","matchCriteriaId":"53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*","matchCriteriaId":"AE210B04-7ECD-419C-9258-0F619A353A8A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*","matchCriteriaId":"3B467741-B277-4128-9804-E13ED23FD310"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*","matchCriteriaId":"5E7EE856-9CE7-49FD-8ADC-05C580CD54A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*","matchCriteriaId":"77DDC99D-8B73-452C-94A7-A9A48F2F379B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*","matchCriteriaId":"5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*","matchCriteriaId":"C48466C4-5A1E-4C71-8822-32D387B36B8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*","matchCriteriaId":"08E23131-D207-4D98-96D5-2B71FF792604"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*","matchCriteriaId":"1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*","matchCriteriaId":"E7109585-1433-4940-B7C9-C561DEAF1498"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*","matchCriteriaId":"1A0D82E1-CCF7-429B-A637-479E839EAE3C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*","matchCriteriaId":"E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*","matchCriteriaId":"4F1B2747-4A9C-44FC-BBA8-39E338B30417"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*","matchCriteriaId":"D5BB7513-C232-4B4F-BE68-972B05086ABD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*","matchCriteriaId":"EA263B60-E7C0-4374-96DF-6E4EB9C16743"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*","matchCriteriaId":"ECCE69A3-41C6-4893-86D4-7F264352C8A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*","matchCriteriaId":"FA654CE6-82C3-43D0-BAED-70E88A740BF1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*","matchCriteriaId":"387FCCC1-B05D-4493-9F05-BAC5A0E57F15"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*","matchCriteriaId":"C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*","matchCriteriaId":"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*","matchCriteriaId":"2C398460-3F38-4AA7-A4B1-FD8A01588DB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*","matchCriteriaId":"CA7F94E8-86FC-456B-A7BB-57953F67F754"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html","source":"cve@mitre.org"},{"url":"http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1302","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1154","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-04/0261.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cisco.com/warp/public/707/ioshttpserver-pub.shtml","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1302","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1154","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0706","sourceIdentifier":"cve@mitre.org","published":"2000-04-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"5658CF74-5AF1-4161-BF4C-6A394F2AA164"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.7:*:*:*:*:*:*:*","matchCriteriaId":"62017AA2-B4DB-44AA-806C-6CFEC839E297"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:1.7.2:*:*:*:*:*:*:*","matchCriteriaId":"E4F9A712-AF96-4A04-B547-F29094ACFE9B"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.0:*:*:*:*:*:*:*","matchCriteriaId":"A2480B45-A626-49F5-A48B-BA6DFAA4411B"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.1:*:*:*:*:*:*:*","matchCriteriaId":"21969A37-9F10-4D70-AC73-F3DB4D169AEB"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:inn:2.2:*:*:*:*:*:*:*","matchCriteriaId":"94FD2948-EF52-464B-A605-DA3806037762"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*","matchCriteriaId":"D8211154-6685-4FF0-B3ED-43A5E5763A10"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"F299301C-6BFC-436C-9CFD-2E291D3702AE"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"4BF54738-3C44-4FD4-AA9C-CAB2E86B1DC1"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"4EF44364-0F57-4B74-81B0-501EA6B58501"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*","matchCriteriaId":"363AB7DB-A8BA-4D58-97C4-1DF1F0F43E07"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*","matchCriteriaId":"89F65C9D-BD68-4A86-BFDC-E7CE76F13948"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/583","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/583","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0429","sourceIdentifier":"cve@mitre.org","published":"2000-04-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A backdoor password in Cart32 3.0 and earlier allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:2.6:*:*:*:*:*:*:*","matchCriteriaId":"D1B408F8-482A-4C1C-AE51-89E6E78F8F5B"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.0:*:*:*:*:*:*:*","matchCriteriaId":"6CF765E6-54DC-42DE-A853-2170F4F8A91E"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95686068203138&w=2","source":"cve@mitre.org"},{"url":"http://www.cart32.com/kbshow.asp?article=c048","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95686068203138&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cart32.com/kbshow.asp?article=c048","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0342","sourceIdentifier":"cve@mitre.org","published":"2000-04-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Eudora 4.x allows remote attackers to bypass the user warning for executable attachments such as .exe, .com, and .bat by using a .lnk file that refers to the attachment, aka \"Stealth Attachment.\""}],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-59"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora:4.0:*:*:*:*:*:*:*","matchCriteriaId":"812A1AE1-56DE-4AA7-9AE8-FE36089189F5"}]}]}],"references":[{"url":"http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077","source":"cve@mitre.org","tags":["Not Applicable","Vendor Advisory"]},{"url":"http://www.peacefire.org/security/stealthattach/explanation.html","source":"cve@mitre.org","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/1157","source":"cve@mitre.org","tags":["Broken Link","Third Party Advisory","VDB Entry"]},{"url":"http://news.cnet.com/news/0-1005-200-1773077.html?tag=st.ne.fd.lthd.1005-200-1773077","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Not Applicable","Vendor Advisory"]},{"url":"http://www.peacefire.org/security/stealthattach/explanation.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"]},{"url":"http://www.securityfocus.com/bid/1157","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link","Third Party Advisory","VDB Entry"]}]}},{"cve":{"id":"CVE-2000-0340","sourceIdentifier":"cve@mitre.org","published":"2000-04-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Gnomelib in SuSE Linux 6.3 allows local users to execute arbitrary commands via the DISPLAY environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*","matchCriteriaId":"0AD0FF64-05DF-48C2-9BB5-FD993121FB2E"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*","matchCriteriaId":"7786607A-362E-4817-A17E-C76D6A1F737D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1155","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=00042902575201.09597%40wintermute-pub","source":"cve@mitre.org"},{"url":"http://www.suse.com/us/support/download/updates/axp_63.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1155","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=00042902575201.09597%40wintermute-pub","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.suse.com/us/support/download/updates/axp_63.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0427","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Eudora 4.1 allows remote attackers to perform a denial of service by sending attachments with long file names."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora:4.2:*:*:*:*:*:*:*","matchCriteriaId":"A2A8B413-CD80-4D91-BE69-9063EA60345B"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora:4.3:*:*:*:*:*:*:*","matchCriteriaId":"A9F8ADFF-D7B7-4907-B5DB-3920BC6EFB7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora_light:3.0:*:*:*:*:*:*:*","matchCriteriaId":"7ACF3406-FA48-412E-A245-2FF225C74893"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:eudora_pro:1.00:*:*:*:*:*:*:*","matchCriteriaId":"31CC9842-AAC0-47B7-B9D5-2411ADBFEB39"}]}]}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0427","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0341","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ATRIUM Cassandra NNTP Server 1.10 allows remote attackers to cause a denial of service via a long login name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atrium_software:cassandra_nntp_server:1.10:*:*:*:*:*:*:*","matchCriteriaId":"9819E684-0CE8-4AE9-A8A1-AF97F6C42750"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=95736106504870&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1156","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://marc.info/?l=ntbugtraq&m=95736106504870&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1156","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0344","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The knfsd NFS server in Linux kernel 2.2.x allows remote attackers to cause a denial of service via a negative size value."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.1:*:*:*:*:*:*:*","matchCriteriaId":"5E4A2912-12AC-4DF1-8023-A0B7DBE9A866"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.2.0:*:*:*:*:*:*:*","matchCriteriaId":"146F7A77-A950-4CAD-BDA9-C239696F569D"},{"vulnerable":true,"criteria":"cpe:2.3:o:linux:linux_kernel:2.3.0:*:*:*:*:*:*:*","matchCriteriaId":"BC74D465-3256-4D87-8F47-C4D7CEA6E2D4"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1160","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0005012042550.6419-100000%40ferret.lmh.ox.ac.uk","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1160","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=Pine.LNX.4.21.0005012042550.6419-100000%40ferret.lmh.ox.ac.uk","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0401","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflows in redirect.exe and changepw.exe in PDGSoft shopping cart allow remote attackers to execute arbitrary commands via a long query string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pdgsoft:pdg_shopping_cart:1.5:*:*:*:*:*:*:*","matchCriteriaId":"90887F5A-23E7-4A0B-9E5A-811878D09A82"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95928319715983&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=95928667119963&w=2","source":"cve@mitre.org"},{"url":"http://www.pdgsoft.com/Security/security2.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1256","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95928319715983&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=ntbugtraq&m=95928667119963&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.pdgsoft.com/Security/security2.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1256","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0440","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetBSD 1.4.2 and earlier allows remote attackers to cause a denial of service by sending a packet with an unaligned IP timestamp option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D0A585A1-FF82-418F-90F8-072458DB7816"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*","matchCriteriaId":"61EBA52A-2D8B-4FB5-866E-AE67CE1842E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:*:*:*:*:*:*","matchCriteriaId":"1C288A88-11C6-429E-A109-0395D0989264"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:*:*:*:*:*:*","matchCriteriaId":"516C6D9A-7483-4E36-A2E0-42698161AD31"}]}]}],"references":[{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-002.txt.asc","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0088.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1173","source":"cve@mitre.org"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-002.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0088.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1173","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0447","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in WebShield SMTP 4.5.44 allows remote attackers to execute arbitrary commands via a long configuration parameter to the WebShield remote management service."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:webshield:4.5.44:*:*:*:*:*:*:*","matchCriteriaId":"D1D831D5-5266-4554-8CB1-731692ACBA9F"}]}]}],"references":[{"url":"http://www.osvdb.org/327","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1254","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A%40exchange.servers.delphis.net","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/327","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1254","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A%40exchange.servers.delphis.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0448","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The WebShield SMTP Management Tool version 4.5.44 does not properly restrict access to the management port when an IP address does not resolve to a hostname, which allows remote attackers to access the configuration via the GET_CONFIG command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:webshield:4.5.44:*:*:*:*:*:*:*","matchCriteriaId":"D1D831D5-5266-4554-8CB1-731692ACBA9F"}]}]}],"references":[{"url":"http://www.osvdb.org/326","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1253","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A%40exchange.servers.delphis.net","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/326","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1253","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=6C740781F92BD411831F0090273A8AB806FD4A%40exchange.servers.delphis.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0449","sourceIdentifier":"cve@mitre.org","published":"2000-05-01T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Omnis Studio 2.4 uses weak encryption (trivial encoding) for encrypting database fields."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:omnis:studio:2.4:*:*:*:*:*:*:*","matchCriteriaId":"02AAE5E5-C466-46FC-B5D6-9D25D5877741"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0311.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1255","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0311.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1255","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0138","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A system has a distributed denial of service (DDOS) attack master, agent, or zombie installed, such as (1) Trinoo, (2) Tribe Flood Network (TFN), (3) Tribe Flood Network 2000 (TFN2K), (4) stacheldraht, (5) mstream, or (6) shaft."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95715370208598&w=2","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95722093124322&w=2","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/alerts/advise48.php3","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95715370208598&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://marc.info/?l=bugtraq&m=95722093124322&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/alerts/advise48.php3","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0293","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"aaa_base in SuSE Linux 6.3, and cron.daily in earlier versions, allow local users to delete arbitrary files by creating files whose names include spaces, which are then incorrectly interpreted by aaa_base when it deletes expired files from the /tmp directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*","matchCriteriaId":"C7F08806-9458-439A-8EAE-2553122262ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*","matchCriteriaId":"0AD0FF64-05DF-48C2-9BB5-FD993121FB2E"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*","matchCriteriaId":"E74E0A28-7C78-4160-8BCF-99605285C0EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*","matchCriteriaId":"76159C25-0760-47CB-AFCE-28306CDEA830"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*","matchCriteriaId":"7786607A-362E-4817-A17E-C76D6A1F737D"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1130","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1130","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0343","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Sniffit 0.3.x with the -L logging option enabled allows remote attackers to execute arbitrary commands via a long MAIL FROM mail header."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:brecht_claerhout:sniffit:0.3.6hip:*:*:*:*:*:*:*","matchCriteriaId":"DE24A14F-9755-441A-9364-E8354D840CEA"},{"vulnerable":true,"criteria":"cpe:2.3:a:brecht_claerhout:sniffit:0.3.7beta:*:*:*:*:*:*:*","matchCriteriaId":"A9AF026F-809E-44DF-8839-4CBD78F5B600"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1158","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005021736.TAA01991%40ALuSSi","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1158","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005021736.TAA01991%40ALuSSi","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0346","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"AppleShare IP 6.1 and later allows a remote attacker to read potentially sensitive information via an invalid range request to the web server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:apple:appleshare:6.1:*:*:ja:*:*:*:*","matchCriteriaId":"6E94AA87-3ECE-4C83-9708-4D641C148460"},{"vulnerable":true,"criteria":"cpe:2.3:a:apple:appleshare:6.2:*:*:ja:*:*:*:*","matchCriteriaId":"6D2DC8A4-1486-4A59-B914-E23E24D506EA"},{"vulnerable":true,"criteria":"cpe:2.3:a:apple:appleshare:6.3:*:*:ja:*:*:*:*","matchCriteriaId":"5051B185-32D5-42A2-8E42-1534470A4C3D"}]}]}],"references":[{"url":"http://asu.info.apple.com/swupdates.nsf/artnum/n11670","source":"cve@mitre.org","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/1162","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502133240.21807.qmail%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://asu.info.apple.com/swupdates.nsf/artnum/n11670","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"]},{"url":"http://www.securityfocus.com/bid/1162","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502133240.21807.qmail%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0347","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 95 and Windows 98 allow a remote attacker to cause a denial of service via a NetBIOS session request packet with a NULL source name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"}]}]}],"references":[{"url":"http://marc.info/?l=ntbugtraq&m=95737580922397&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1163","source":"cve@mitre.org"},{"url":"http://marc.info/?l=ntbugtraq&m=95737580922397&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1163","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0385","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FileMaker Pro 5 Web Companion allows remote attackers to bypass Field-Level database security restrictions via the XML publishing or email capabilities."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:filemaker:filemaker:5.0:*:pro:*:*:*:*:*","matchCriteriaId":"C5E304BE-7628-463F-B27B-C4F7A6398669"}]}]}],"references":[{"url":"http://www.blueworld.com/blueworld/news/05.01.00-FM5_Security.html","source":"cve@mitre.org"},{"url":"http://www.filemaker.com/support/webcompanion.html","source":"cve@mitre.org"},{"url":"http://www.blueworld.com/blueworld/news/05.01.00-FM5_Security.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.filemaker.com/support/webcompanion.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0386","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"FileMaker Pro 5 Web Companion allows remote attackers to send anonymous or forged email."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:filemaker:filemaker:5.0:*:pro:*:*:*:*:*","matchCriteriaId":"C5E304BE-7628-463F-B27B-C4F7A6398669"}]}]}],"references":[{"url":"http://www.blueworld.com/blueworld/news/05.01.00-FM5_Security.html","source":"cve@mitre.org"},{"url":"http://www.filemaker.com/support/webcompanion.html","source":"cve@mitre.org"},{"url":"http://www.blueworld.com/blueworld/news/05.01.00-FM5_Security.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.filemaker.com/support/webcompanion.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0433","sourceIdentifier":"cve@mitre.org","published":"2000-05-02T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The SuSE aaa_base package installs some system accounts with home directories set to /tmp, which allows local users to gain privileges to those accounts by creating standard user startup scripts such as profiles."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:alpha:*:*:*:*:*:*","matchCriteriaId":"C7F08806-9458-439A-8EAE-2553122262ED"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*","matchCriteriaId":"0AD0FF64-05DF-48C2-9BB5-FD993121FB2E"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:ppc:*:*:*:*:*","matchCriteriaId":"E74E0A28-7C78-4160-8BCF-99605285C0EE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:alpha:*:*:*:*:*:*","matchCriteriaId":"76159C25-0760-47CB-AFCE-28306CDEA830"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*","matchCriteriaId":"7786607A-362E-4817-A17E-C76D6A1F737D"}]}]}],"references":[{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_47.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_47.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0303","sourceIdentifier":"cve@mitre.org","published":"2000-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Quake3 Arena allows malicious server operators to read or modify files on a client via a dot dot (..) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:id_software:quake_3_arena:1.16n:*:*:*:*:*:*:*","matchCriteriaId":"61EE121C-3B3C-4AD3-8B23-4401A97979A6"}]}]}],"references":[{"url":"http://www.osvdb.org/7531","source":"cve@mitre.org"},{"url":"http://www.quake3arena.com/news/index.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1169","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/alerts/advise50.php3","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/7531","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.quake3arena.com/news/index.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1169","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/alerts/advise50.php3","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0332","sourceIdentifier":"cve@mitre.org","published":"2000-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UltraBoard.pl or UltraBoard.cgi CGI scripts in UltraBoard 1.6 allows remote attackers to read arbitrary files via a pathname string that includes a dot dot (..) and ends with a null byte."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ultrascripts:ultraboard:1.6:*:*:*:*:*:*:*","matchCriteriaId":"FE904F8B-7BC2-4E57-B528-327A45AE24CA"}]}]}],"references":[{"url":"http://www.osvdb.org/1309","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/4065","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1164","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000503091316.99073.qmail%40hotmail.com","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1309","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/4065","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1164","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000503091316.99073.qmail%40hotmail.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0335","sourceIdentifier":"cve@mitre.org","published":"2000-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The resolver in glibc 2.1.3 uses predictable IDs, which allows a local attacker to spoof DNS query results."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:2.0:*:*:*:*:*:*:*","matchCriteriaId":"E5C0577C-6BC7-418F-B2C5-B74800D43418"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:2.1:*:*:*:*:*:*:*","matchCriteriaId":"4E2A0F12-FD00-40B9-86AD-7D082385E5DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:2.1.1:*:*:*:*:*:*:*","matchCriteriaId":"8ED8F0E8-A969-4F7F-A100-662F4A5426FD"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:2.1.2:*:*:*:*:*:*:*","matchCriteriaId":"AE582B8F-4E31-4D0F-B2F9-AC83C855F751"},{"vulnerable":true,"criteria":"cpe:2.3:a:gnu:glibc:2.1.3:*:*:*:*:*:*:*","matchCriteriaId":"DB56D9C9-13B3-418C-B06C-0997E165F1C7"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2:*:*:*:*:*:*:*","matchCriteriaId":"52D1DAE0-DB4D-475F-B11B-29AA3A00DB60"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2.1:*:*:*:*:*:*:*","matchCriteriaId":"93BB48F5-A635-402E-AE7F-B8AB90ED0C70"},{"vulnerable":true,"criteria":"cpe:2.3:a:isc:bind:8.2.2:*:*:*:*:*:*:*","matchCriteriaId":"C5FE281A-610F-42CA-B741-53F2D70A3F38"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1166","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1166","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0345","sourceIdentifier":"cve@mitre.org","published":"2000-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The on-line help system options in Cisco routers allows non-privileged users without \"enabled\" access to obtain sensitive information via the show command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:9.14:*:*:*:*:*:*:*","matchCriteriaId":"327028C0-D9F3-46A3-B2CC-4630FE18C43E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*","matchCriteriaId":"82B6315D-7BEF-419F-9B93-3CF669E986D1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(13\\):*:*:*:*:*:*:*","matchCriteriaId":"B36FF40E-EF0A-4149-A35D-8D765EBFFAE2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(13\\)aa:*:*:*:*:*:*:*","matchCriteriaId":"51382DA5-4EBC-44DC-951F-32FC7AA719A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(13\\)ca:*:*:*:*:*:*:*","matchCriteriaId":"5BA2A1FD-11A3-403A-B5A6-0220CA18EC99"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(13\\)ia:*:*:*:*:*:*:*","matchCriteriaId":"3493F361-0C8A-4B66-AF6B-926E2D66BBEE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*","matchCriteriaId":"841513AE-7521-4670-8438-AE5EB70F3A48"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*","matchCriteriaId":"FF3E8F79-6177-453C-99B5-BC9BC7670869"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*","matchCriteriaId":"4B244655-A6A5-40D0-A0D1-34C814DA9389"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*","matchCriteriaId":"CA064273-1A6E-4303-BAAB-F585691EF9BA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*","matchCriteriaId":"0A8158E2-0DFE-479B-B085-9775FF700C85"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*","matchCriteriaId":"29CA3070-B75D-4E56-A338-E10F5509394E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*","matchCriteriaId":"E8026B11-6144-467F-8094-F4F73CD37526"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(4\\)f1:*:*:*:*:*:*:*","matchCriteriaId":"17DE2319-19D9-4C02-80B4-0A6AAD853867"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\):*:*:*:*:*:*:*","matchCriteriaId":"82BFEABB-6E90-4A24-BBE3-2BDB524028A0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\)p:*:*:*:*:*:*:*","matchCriteriaId":"F169E322-3D72-4F86-BD5F-74589E5DD823"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa1:*:*:*:*:*:*:*","matchCriteriaId":"DBA5D334-6DB8-44B0-92EF-8694BBE79A9D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*","matchCriteriaId":"099CFED1-0E2F-46B2-8136-BFA146EB9A00"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa5:*:*:*:*:*:*:*","matchCriteriaId":"754F06BF-EB7D-4DAD-BF5D-7DF2619A7499"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*","matchCriteriaId":"047F9781-38B8-488C-B999-A3CA6BDB639C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*","matchCriteriaId":"3E3586C0-64AF-4584-8F56-7E0756B4A521"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*","matchCriteriaId":"9B784C9F-79EE-4D08-9D03-985EC7E378FE"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*","matchCriteriaId":"FFBA8825-442E-4CAD-A9B2-4DD8546F35F9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2\\(17\\):*:*:*:*:*:*:*","matchCriteriaId":"F106D24F-7EDD-4A52-9A3A-F25E6EEC1870"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*","matchCriteriaId":"0DC1411B-4E7E-4F57-B025-9FE27B09C7AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*","matchCriteriaId":"8F86F790-6247-42F2-9487-3D60A2842F52"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*","matchCriteriaId":"53D87AC5-0F63-4AE8-AC05-FCEC98D18BDC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*","matchCriteriaId":"AE210B04-7ECD-419C-9258-0F619A353A8A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*","matchCriteriaId":"3B467741-B277-4128-9804-E13ED23FD310"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*","matchCriteriaId":"5E7EE856-9CE7-49FD-8ADC-05C580CD54A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\):*:*:*:*:*:*:*","matchCriteriaId":"77DDC99D-8B73-452C-94A7-A9A48F2F379B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*","matchCriteriaId":"5145C737-2D5E-4BD4-BA9F-66ED2887A4DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*","matchCriteriaId":"C48466C4-5A1E-4C71-8822-32D387B36B8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xf:*:*:*:*:*:*:*","matchCriteriaId":"08E23131-D207-4D98-96D5-2B71FF792604"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(2\\)xg:*:*:*:*:*:*:*","matchCriteriaId":"1BFB5A8C-BF1B-4111-9E6A-F8D8FE1476AA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(3\\)t2:*:*:*:*:*:*:*","matchCriteriaId":"E7109585-1433-4940-B7C9-C561DEAF1498"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\):*:*:*:*:*:*:*","matchCriteriaId":"1A0D82E1-CCF7-429B-A637-479E839EAE3C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)s:*:*:*:*:*:*:*","matchCriteriaId":"E9D1F7A6-6DB3-41D1-BD87-DE1898EC91A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(4\\)t:*:*:*:*:*:*:*","matchCriteriaId":"4F1B2747-4A9C-44FC-BBA8-39E338B30417"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(5\\):*:*:*:*:*:*:*","matchCriteriaId":"D5BB7513-C232-4B4F-BE68-972B05086ABD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(5\\)t1:*:*:*:*:*:*:*","matchCriteriaId":"EA263B60-E7C0-4374-96DF-6E4EB9C16743"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(6\\):*:*:*:*:*:*:*","matchCriteriaId":"ECCE69A3-41C6-4893-86D4-7F264352C8A9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(7\\)t:*:*:*:*:*:*:*","matchCriteriaId":"FA654CE6-82C3-43D0-BAED-70E88A740BF1"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(8\\):*:*:*:*:*:*:*","matchCriteriaId":"387FCCC1-B05D-4493-9F05-BAC5A0E57F15"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0\\(9\\)s:*:*:*:*:*:*:*","matchCriteriaId":"C4EB360F-7BAE-4BB5-BB55-E3FFC567A1E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*","matchCriteriaId":"4F7CF26C-AEAA-42D7-8136-56E77E73DCB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*","matchCriteriaId":"2C398460-3F38-4AA7-A4B1-FD8A01588DB5"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*","matchCriteriaId":"CA7F94E8-86FC-456B-A7BB-57953F67F754"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router_2500:*:*:*:*:*:*:*:*","matchCriteriaId":"317EF7FA-B744-487C-AEB6-4516CF03F9B3"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router_2600:*:*:*:*:*:*:*:*","matchCriteriaId":"C3B03AEF-EACD-4B3D-AA1E-EADC344C02BE"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router_3600:*:*:*:*:*:*:*:*","matchCriteriaId":"B0460513-094F-4F99-B0EB-7AA484D21920"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router_4000:*:*:*:*:*:*:*:*","matchCriteriaId":"446980C5-E512-475C-B255-86A8726A67D2"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router_7200:*:*:*:*:*:*:*:*","matchCriteriaId":"637F3047-DF5B-481D-8595-B54B076A5CD7"},{"vulnerable":true,"criteria":"cpe:2.3:h:cisco:router_7500:*:*:*:*:*:*:*:*","matchCriteriaId":"CA7F3C4B-378B-4431-B4AF-09D95354363E"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1161","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1161","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000502222246.28423.qmail%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0378","sourceIdentifier":"cve@mitre.org","published":"2000-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The pam_console PAM module in Linux systems performs a chown on various devices upon a user login, but an open file descriptor for those devices can be maintained after the user logs out, which allows that user to sniff activity on these devices when subsequent users log in."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"2DFA94D5-0139-490C-8257-0751FE9FBAE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"2EC4D3AB-38FA-4D44-AF5C-2DCD15994E76"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"0633B5A6-7A88-4A96-9462-4C09D124ED36"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0023.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1176","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0023.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1176","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0425","sourceIdentifier":"cve@mitre.org","published":"2000-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the Web Archives component of L-Soft LISTSERV 1.8 allows remote attackers to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lsoft:listserv:1.8:*:*:*:*:*:*:*","matchCriteriaId":"B0D4962F-C7E7-4EE2-880C-0E58D7E6B9D5"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0048.html","source":"cve@mitre.org"},{"url":"http://www.lsoft.com/news/default.asp?item=Advisory0","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1167","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0048.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.lsoft.com/news/default.asp?item=Advisory0","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1167","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0430","sourceIdentifier":"cve@mitre.org","published":"2000-05-03T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cart32 allows remote attackers to access sensitive debugging information by appending /expdate to the URL request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcmurtrey_whitaker_and_associates:cart32:3.0:*:*:*:*:*:*:*","matchCriteriaId":"6CF765E6-54DC-42DE-A853-2170F4F8A91E"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95738697301956&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1358","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95738697301956&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1358","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0414","sourceIdentifier":"cve@mitre.org","published":"2000-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in shutdown command for HP-UX 11.X and 10.X allows allows local users to gain privileges via malformed input variables."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*","matchCriteriaId":"38BFA923-7D80-4F01-AF9F-6F13209948AC"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*","matchCriteriaId":"EDE44C49-172C-4899-8CC8-29AA99A7CD2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*","matchCriteriaId":"771931F7-9180-4EBD-8627-E1CF17D24647"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:vvos:10.24:*:*:*:*:*:*:*","matchCriteriaId":"D9B7C178-4BE6-4397-A4E2-01375E4CA978"},{"vulnerable":true,"criteria":"cpe:2.3:o:hp:vvos:11.04:*:*:*:*:*:*:*","matchCriteriaId":"1D462D6F-EB68-4E31-87FD-D918F5DEF3FB"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0047.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1214","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0047.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1214","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0422","sourceIdentifier":"cve@mitre.org","published":"2000-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Netwin DMailWeb CGI program allows remote attackers to execute arbitrary commands via a long utoken parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netwin:dmail:2.5d:*:*:*:*:*:*:*","matchCriteriaId":"EF456029-C817-4FC5-AFE2-9637219E220C"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95749276827558&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1171","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95749276827558&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1171","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0427","sourceIdentifier":"cve@mitre.org","published":"2000-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Aladdin Knowledge Systems eToken device allows attackers with physical access to the device to obtain sensitive information without knowing the PIN of the owner by resetting the PIN in the EEPROM."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:P","baseScore":4.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aladdin_knowledge_systems:etoken:3.3.3:*:*:*:*:*:*:*","matchCriteriaId":"2433D9B8-4C1A-4873-9E9A-E640CF34A1DF"}]}]}],"references":[{"url":"http://www.l0pht.com/advisories/etoken-piepa.txt","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/3266","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1170","source":"cve@mitre.org"},{"url":"http://www.l0pht.com/advisories/etoken-piepa.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/3266","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1170","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0428","sourceIdentifier":"cve@mitre.org","published":"2000-05-04T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the SMTP gateway for InterScan Virus Wall 3.32 and earlier allows a remote attacker to execute arbitrary commands via a long filename for a uuencoded attachment."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.0.1:*:*:*:*:*:*:*","matchCriteriaId":"DEC14336-CD53-44F7-B271-3C98C016295B"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.2.3:*:*:*:*:*:*:*","matchCriteriaId":"D948171A-3B54-462A-8B2E-2C0266A37E94"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.3:*:*:*:*:*:*:*","matchCriteriaId":"7A9D4E2E-889B-4233-8887-9CF00A5023A7"},{"vulnerable":true,"criteria":"cpe:2.3:a:trend_micro:interscan_viruswall:3.32:*:*:*:*:*:*:*","matchCriteriaId":"2F72A6DE-BA1B-4907-B19D-D71B172BB249"}]}]}],"references":[{"url":"http://www.nai.com/nai_labs/asp_set/advisory/39_Trend.asp","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1168","source":"cve@mitre.org"},{"url":"http://www.nai.com/nai_labs/asp_set/advisory/39_Trend.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1168","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0381","sourceIdentifier":"cve@mitre.org","published":"2000-05-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Gossamer Threads DBMan db.cgi CGI script allows remote attackers to view environmental variables and setup information by referencing a non-existing database in the db parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:N","baseScore":6.4,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gossamer_threads:dbman:2.0.4:*:*:*:*:*:*:*","matchCriteriaId":"F46D142E-0060-41CF-9F60-7C80F4FFE11F"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0067.html","source":"cve@mitre.org"},{"url":"http://www.perfectotech.com/blackwatchlabs/vul5_05.html","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/1178","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0067.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.perfectotech.com/blackwatchlabs/vul5_05.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/1178","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0423","sourceIdentifier":"cve@mitre.org","published":"2000-05-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Netwin DNEWSWEB CGI program allows remote attackers to execute arbitrary commands via long parameters such as group, cmd, and utag."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netwin:dnews:5.3:*:*:*:*:*:*:*","matchCriteriaId":"042F5F6C-3F2F-4847-B94B-C38AD2E69D81"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95764950403250&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1172","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95764950403250&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1172","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0426","sourceIdentifier":"cve@mitre.org","published":"2000-05-05T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"UltraBoard 1.6 and other versions allow remote attackers to cause a denial of service by referencing UltraBoard in the Session parameter, which causes UltraBoard to fork copies of itself."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ultrascripts:ultraboard:1.6:*:*:*:*:*:*:*","matchCriteriaId":"FE904F8B-7BC2-4E57-B528-327A45AE24CA"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0059.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1175","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0059.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1175","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0413","sourceIdentifier":"cve@mitre.org","published":"2000-05-06T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The shtml.exe program in the FrontPage extensions package of IIS 4.0 and 5.0 allows remote attackers to determine the physical path of HTML, HTM, ASP, and SHTML files by requesting a file that does not exist, which generates an error message that reveals the path."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*","matchCriteriaId":"0951E183-2BFE-4B19-9F06-107B5E22DBC5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0084.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1174","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0084.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1174","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0382","sourceIdentifier":"cve@mitre.org","published":"2000-05-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ColdFusion ClusterCATS appends stale query string arguments to a URL during HTML redirection, which may provide sensitive information to the redirected site."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:clustercats:1.0:*:*:*:*:*:*:*","matchCriteriaId":"5D6643CF-8F88-4168-8D43-B954B1E7CBD5"}]}]}],"references":[{"url":"http://www.allaire.com/handlers/index.cfm?ID=15697&Method=Full","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1179","source":"cve@mitre.org"},{"url":"http://www.allaire.com/handlers/index.cfm?ID=15697&Method=Full","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1179","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0383","sourceIdentifier":"cve@mitre.org","published":"2000-05-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The file transfer component of AOL Instant Messenger (AIM) reveals the physical path of the transferred file to the remote recipient."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:aol:instant_messenger:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E00F0805-8C73-43B1-87AC-744434046E59"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1180","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=002401bfb918%247310d5a0%241ef084ce%40karemor.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1180","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=002401bfb918%247310d5a0%241ef084ce%40karemor.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0384","sourceIdentifier":"cve@mitre.org","published":"2000-05-08T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetStructure 7110 and 7180 have undocumented accounts (servnow, root, and wizard) whose passwords are easily guessable from the NetStructure's MAC address, which could allow remote attackers to gain root access."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:intel:netstructure_7110:*:*:*:*:*:*:*:*","matchCriteriaId":"141BF9B0-29DC-42DC-A53E-96818BE1450F"},{"vulnerable":true,"criteria":"cpe:2.3:h:intel:netstructure_7180:*:*:*:*:*:*:*:*","matchCriteriaId":"9FEE7633-BA33-4D8B-B6B4-B914707666AB"}]}]}],"references":[{"url":"http://216.188.41.136/","source":"cve@mitre.org"},{"url":"http://www.l0pht.com/advisories/ipivot7180.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.lopht.com/advisories/ipivot7110.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1182","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1183","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://216.188.41.136/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.l0pht.com/advisories/ipivot7180.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.lopht.com/advisories/ipivot7110.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1182","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1183","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0387","sourceIdentifier":"cve@mitre.org","published":"2000-05-09T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The makelev program in the golddig game from the FreeBSD ports collection allows local users to overwrite arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:P/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:alexander_siegel:golddig:2.0:*:*:*:*:*:*:*","matchCriteriaId":"B4F416BC-FB54-4CE1-86CA-931214005408"}]}]}],"references":[{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:16.golddig.asc","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1184","source":"cve@mitre.org"},{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:16.golddig.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1184","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0304","sourceIdentifier":"cve@mitre.org","published":"2000-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Microsoft IIS 4.0 and 5.0 with the IISADMPWD virtual directory installed allows a remote attacker to cause a denial of service via a malformed request to the inetinfo.exe program, aka the \"Undelimited .HTR Request\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1191","source":"cve@mitre.org"},{"url":"http://xforce.iss.net/alerts/advise52.php3","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-031","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1191","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://xforce.iss.net/alerts/advise52.php3","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-031","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0406","sourceIdentifier":"cve@mitre.org","published":"2000-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape Communicator before version 4.73 and Navigator 4.07 do not properly validate SSL certificates, which allows remote attackers to steal information by redirecting traffic from a legitimate web server to their own malicious server, aka the \"Acros-Suencksen SSL\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.05:*:*:*:*:*:*:*","matchCriteriaId":"494AFC1E-67A3-41CA-B920-B8F778B68A99"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5_beta:*:*:*:*:*:*:*","matchCriteriaId":"213EB326-33D1-4329-A6BB-B1AA1C626E44"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.06:*:*:*:*:*:*:*","matchCriteriaId":"34F6328B-44A8-4E45-918E-C54285040BFE"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*","matchCriteriaId":"529E3F71-6016-461D-A162-0DBDD5505389"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.07:*:*:*:*:*:*:*","matchCriteriaId":"31D02C4D-3FD1-425F-B0DB-7808089BCD0B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"38FD74F5-12ED-4049-B06F-0F22A0254C0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*","matchCriteriaId":"918BE44C-8D64-4040-BC74-802AA3FA4E10"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*","matchCriteriaId":"6AA534C4-9411-44EC-AA34-2287C79AD235"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*","matchCriteriaId":"3A4E8588-A941-4759-B41C-00F193F2C63B"}]}]}],"references":[{"url":"http://www.acrossecurity.com/aspr/ASPR-2000-04-06-1-PUB.txt","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-05.html","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-028.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1188","source":"cve@mitre.org"},{"url":"http://www.acrossecurity.com/aspr/ASPR-2000-04-06-1-PUB.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-2000-05.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-028.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1188","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0409","sourceIdentifier":"cve@mitre.org","published":"2000-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape 4.73 and earlier follows symlinks when it imports a new certificate, which allows local users to overwrite files of the user importing the certificate."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:H/Au:N/C:P/I:P/A:P","baseScore":3.7,"accessVector":"LOCAL","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":1.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*","matchCriteriaId":"529E3F71-6016-461D-A162-0DBDD5505389"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"38FD74F5-12ED-4049-B06F-0F22A0254C0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*","matchCriteriaId":"918BE44C-8D64-4040-BC74-802AA3FA4E10"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*","matchCriteriaId":"6AA534C4-9411-44EC-AA34-2287C79AD235"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*","matchCriteriaId":"3A4E8588-A941-4759-B41C-00F193F2C63B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.73:*:*:*:*:*:*:*","matchCriteriaId":"3E48C051-EB45-4262-86C2-2333FD5C7745"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0126.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1201","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0126.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1201","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0410","sourceIdentifier":"cve@mitre.org","published":"2000-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ColdFusion Server 4.5.1 allows remote attackers to cause a denial of service by making repeated requests to a CFCACHE tagged cache file that is not stored in memory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:allaire:coldfusion_server:4.5.1:*:*:*:*:*:*:*","matchCriteriaId":"5FA98847-8A14-409C-86E8-C7652E5ECF0C"}]}]}],"references":[{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0005&L=ntbugtraq&F=&S=&P=4843","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1192","source":"cve@mitre.org"},{"url":"http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0005&L=ntbugtraq&F=&S=&P=4843","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1192","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0411","sourceIdentifier":"cve@mitre.org","published":"2000-05-10T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Matt Wright's FormMail CGI script allows remote attackers to obtain environmental variables via the env_report parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_wright:formmail:1.6:*:*:*:*:*:*:*","matchCriteriaId":"B565A52D-EA07-4603-91B7-0105E632A2EC"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0125.html","source":"cve@mitre.org"},{"url":"http://www.perfectotech.com/blackwatchlabs/vul5_10.html","source":"cve@mitre.org","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/1187","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0125.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.perfectotech.com/blackwatchlabs/vul5_10.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["URL Repurposed"]},{"url":"http://www.securityfocus.com/bid/1187","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0408","sourceIdentifier":"cve@mitre.org","published":"2000-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"IIS 4.05 and 5.0 allow remote attackers to cause a denial of service via a long, complex URL that appears to contain a large number of file extensions, aka the \"Malformed Extension Data in URL\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"}]}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=260205","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1190","source":"cve@mitre.org"},{"url":"http://www.ussrback.com/labs40.html","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-030","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=260205","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1190","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.ussrback.com/labs40.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-030","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0416","sourceIdentifier":"cve@mitre.org","published":"2000-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NTMail 5.x allows network users to bypass the NTMail proxy restrictions by redirecting their requests to NTMail's web configuration server."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"}]}]}],"references":[{"url":"http://www.gordano.com/support/archives/ntmail/2000-05/00001114.htm","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1196","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NABBJLKKPKIHDIMKFKGCMEFANMAB.georger%40nls.net","source":"cve@mitre.org"},{"url":"http://www.gordano.com/support/archives/ntmail/2000-05/00001114.htm","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1196","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NABBJLKKPKIHDIMKFKGCMEFANMAB.georger%40nls.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0419","sourceIdentifier":"cve@mitre.org","published":"2000-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Office 2000 UA ActiveX Control is marked as \"safe for scripting,\" which allows remote attackers to conduct unauthorized activities via the \"Show Me\" function in Office Help, aka the \"Office 2000 UA Control\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:access:2000:*:*:*:*:*:*:*","matchCriteriaId":"90D7BA07-3BCA-41CF-B5D3-341E912650A2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:excel:2000:*:*:*:*:*:*:*","matchCriteriaId":"F55D42D5-7371-47C2-BF55-B7F51C19B61E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:frontpage:2000:*:*:*:*:*:*:*","matchCriteriaId":"D2C6629C-BF53-49A1-B32C-A828CA0A0500"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*","matchCriteriaId":"A9A82D13-513C-46FA-AF51-0582233E230A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:2000:*:*:*:*:*:*:*","matchCriteriaId":"D52F17AB-2C87-4C1A-91B5-267ABBCF5844"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:photodraw_2000:1.0:*:*:*:*:*:*:*","matchCriteriaId":"FFE1D04D-8B79-4401-9225-F15EDEBDDFC4"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:powerpoint:2000:*:*:*:*:*:*:*","matchCriteriaId":"3E392539-ABF6-4B5C-AEC3-C54B51E0DB70"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*","matchCriteriaId":"3F09162C-01F0-4056-94D3-995713F92AE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:word:2000:*:*:*:*:*:*:*","matchCriteriaId":"AEBFF713-0884-43BF-9AB8-777664FD64AF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:works:2000:*:*:*:*:*:*:*","matchCriteriaId":"78389936-D2E5-4A3A-8E7A-AA42FFAD832B"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-2000-07.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=262767","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1197","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-07.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=262767","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1197","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-034","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0420","sourceIdentifier":"cve@mitre.org","published":"2000-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The default configuration of SYSKEY in Windows 2000 stores the startup key in the registry, which could allow an attacker tor ecover it and use it to decrypt Encrypted File System (EFS) data."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0112.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1198","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0112.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1198","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0421","sourceIdentifier":"cve@mitre.org","published":"2000-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The process_bug.cgi script in Bugzilla allows remote attackers to execute arbitrary commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mozilla:bugzilla:2.8:*:*:*:*:*:*:*","matchCriteriaId":"F6E5E379-D475-42F3-B0DC-3D04C1D25566"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0128.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1199","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0128.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1199","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0439","sourceIdentifier":"cve@mitre.org","published":"2000-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.0 and 5.0 allows a malicious web site to obtain client cookies from another domain by including that domain name and escaped characters in a URL, aka the \"Unauthorized Cookie Access\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:N/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*","matchCriteriaId":"1BBF9241-A175-438C-A793-3D245BE2AE35"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:3.2:*:*:*:*:*:*:*","matchCriteriaId":"8873A08F-D4C7-46FC-8FE5-972644F85ADA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.1:*:*:*:*:*:*:*","matchCriteriaId":"44FF4E47-AD75-42C7-BB84-42BBA46A58B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"}]}]}],"references":[{"url":"http://www.osvdb.org/1326","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1194","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000511135609.D7774%40securityfocus.com","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NDBBKGHPMKBKDDGLDEEHAEHMDIAA.rms2000%40bellatlantic.net","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4447","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1326","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1194","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000511135609.D7774%40securityfocus.com","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=NDBBKGHPMKBKDDGLDEEHAEHMDIAA.rms2000%40bellatlantic.net","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4447","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0457","sourceIdentifier":"cve@mitre.org","published":"2000-05-11T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ISM.DLL in IIS 4.0 and 5.0 allows remote attackers to read file contents by requesting the file and appending a large number of encoded spaces (%20) and terminated with a .htr extension, aka the \".HTR File Fragment Reading\" or \"File Fragment Reading via .HTR\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*","matchCriteriaId":"5D47E9C4-5439-4A82-BBD8-D6B482B47E51"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_information_services:5.0:*:*:*:*:*:*:*","matchCriteriaId":"413C07EA-139F-4B7D-A58B-835BD2591FA0"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95810120719608&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1193","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-031","source":"cve@mitre.org"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4448","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95810120719608&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1193","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-031","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4448","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0407","sourceIdentifier":"cve@mitre.org","published":"2000-05-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Solaris netpr program allows local users to execute arbitrary commands via a long -p option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*","matchCriteriaId":"34EBF074-78C8-41AF-88F1-DA6726E56F8B"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*","matchCriteriaId":"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*","matchCriteriaId":"1894C542-AA81-40A9-BF47-AE24C93C1ACB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*","matchCriteriaId":"369207B4-96FA-4324-9445-98FAE8ECF5DB"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*","matchCriteriaId":"08003947-A4F1-44AC-84C6-9F8D097EB759"},{"vulnerable":true,"criteria":"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*","matchCriteriaId":"A2475113-CFE4-41C8-A86F-F2DA6548D224"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0141.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1200","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0141.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1200","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0415","sourceIdentifier":"cve@mitre.org","published":"2000-05-12T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Outlook Express 4.x allows attackers to cause a denial of service via a mail or news message that has a .jpg or .bmp attachment with a long file name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook:98:*:*:*:*:*:*:*","matchCriteriaId":"52970A43-173E-477B-80BF-6FDBB6B0EECD"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.0:*:*:*:*:*:*:*","matchCriteriaId":"6764F97F-6906-4953-BB1C-AA6345FA8FBE"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.01:*:*:*:*:*:*:*","matchCriteriaId":"BA267F42-5A1F-4663-9D4D-AF5DD64FD2DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.27.3110.1:*:*:*:*:*:*:*","matchCriteriaId":"6BAE90D0-1637-49F4-8453-5E9959B55002"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.72.2106.4:*:*:*:*:*:*:*","matchCriteriaId":"D707B4FB-4BB2-4C84-851B-A8926AC26B7A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.72.3120.0:*:*:*:*:*:*:*","matchCriteriaId":"7769EE2E-A740-4AE8-B1B1-A5256C12601D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:outlook_express:4.72.3612.1700:*:*:*:*:*:*:*","matchCriteriaId":"14B52779-4A43-4507-988F-5B5A81658FF5"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0140.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1195","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0140.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1195","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}},{"cve":{"id":"CVE-2000-0400","sourceIdentifier":"cve@mitre.org","published":"2000-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Microsoft Active Movie ActiveX Control in Internet Explorer 5 does not restrict which file types can be downloaded, which allows an attacker to download any type of file to a user's system by encoding it within an email message or news post."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5:*:*:*:*:*:*:*","matchCriteriaId":"B4071D03-D955-4C1B-ACD8-A864F7D0FA02"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95868514521257&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1221","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95868514521257&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1221","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0434","sourceIdentifier":"cve@mitre.org","published":"2000-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The administrative password for the Allmanage web site administration software is stored in plaintext in a file which could be accessed by remote attackers."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matthew_redman:allmanage:2.6:*:*:*:*:*:*:*","matchCriteriaId":"625922AE-179F-494E-89ED-C9DB478E69C5"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0167.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1217","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0167.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1217","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0435","sourceIdentifier":"cve@mitre.org","published":"2000-05-13T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The allmanageup.pl file upload CGI script in the Allmanage Website administration software 2.6 can be called directly by remote attackers, which allows them to modify user accounts or web pages."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matthew_redman:allmanage:2.6:*:*:*:*:*:*:*","matchCriteriaId":"625922AE-179F-494E-89ED-C9DB478E69C5"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0167.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1337","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1217","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0167.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1337","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1217","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0397","sourceIdentifier":"cve@mitre.org","published":"2000-05-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The EMURL web-based email account software encodes predictable identifiers in user session URLs, which allows a remote attacker to access a user's email account."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:seattle_lab_software:emurl:2.0:*:*:*:*:*:*:*","matchCriteriaId":"D31CABA9-4306-4EA7-A3C7-5DCC38B7EC43"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0160.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1203","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0160.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1203","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0424","sourceIdentifier":"cve@mitre.org","published":"2000-05-15T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The CGI counter 4.0.7 by George Burgyan allows remote attackers to execute arbitrary commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:george_burgyan:cgi_counter:4.0.2:*:*:*:*:*:*:*","matchCriteriaId":"1AA621CE-EA92-4BCA-A588-1F8FB8B5F9C1"},{"vulnerable":true,"criteria":"cpe:2.3:a:george_burgyan:cgi_counter:4.0.7:*:*:*:*:*:*:*","matchCriteriaId":"0DC7B0FA-174C-42D1-A43F-1F250BCB0C92"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1202","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005151024.aa01811%40blaze.arl.mil","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1202","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005151024.aa01811%40blaze.arl.mil","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-0980","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows NT Service Control Manager (SCM) allows remote attackers to cause a denial of service via a malformed argument in a resource enumeration request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:server:*:*:*:*:*","matchCriteriaId":"7C5FCE82-1E2F-49B9-B504-8C03F2BCF296"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:terminal_server:*:*:*:*:*","matchCriteriaId":"6E7E6AD3-5418-4FEA-84B5-833059CA880D"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:enterprise:*:*:*:*:*","matchCriteriaId":"BBD9C514-5AF7-4849-A535-F0F3C9339051"}]}]}],"references":[{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246045","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-055","source":"cve@mitre.org"},{"url":"http://support.microsoft.com/default.aspx?scid=kb%3B%5BLN%5D%3BQ246045","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-055","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0379","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Netopia R9100 router does not prevent authenticated users from modifying SNMP tables, even if the administrator has configured it to do so."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:P/A:N","baseScore":3.6,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":4.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:netopia:r-series_routers:4.6.2:*:*:*:*:*:*:*","matchCriteriaId":"2E769B01-CD4A-4307-A647-70F7476C3F58"}]}]}],"references":[{"url":"http://www.netopia.com/equipment/purchase/fmw_update.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1177","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005082054.NAA32590%40linux.mtndew.com","source":"cve@mitre.org"},{"url":"http://www.netopia.com/equipment/purchase/fmw_update.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1177","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=200005082054.NAA32590%40linux.mtndew.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0389","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in krb_rd_req function in Kerberos 4 and 5 allows remote attackers to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:cygnus_network_security:4.0:*:*:*:*:*:*:*","matchCriteriaId":"05857121-8827-45FD-886F-4269E0336036"},{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:kerbnet:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EE1B0821-64F1-46E3-8DD3-12FFD1B037F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"AFB8BD89-F049-4C3B-8744-E8D00D752DE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*","matchCriteriaId":"08FA60A9-10E1-4ACD-819C-17801FAD7671"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1220","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1220","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0390","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in krb425_conv_principal function in Kerberos 5 allows remote attackers to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:cygnus_network_security:4.0:*:*:*:*:*:*:*","matchCriteriaId":"05857121-8827-45FD-886F-4269E0336036"},{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:kerbnet:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EE1B0821-64F1-46E3-8DD3-12FFD1B037F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"AFB8BD89-F049-4C3B-8744-E8D00D752DE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*","matchCriteriaId":"08FA60A9-10E1-4ACD-819C-17801FAD7671"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/4884","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1220","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/4884","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1220","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0391","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in krshd in Kerberos 5 allows remote attackers to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:cygnus_network_security:4.0:*:*:*:*:*:*:*","matchCriteriaId":"05857121-8827-45FD-886F-4269E0336036"},{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:kerbnet:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EE1B0821-64F1-46E3-8DD3-12FFD1B037F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"AFB8BD89-F049-4C3B-8744-E8D00D752DE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*","matchCriteriaId":"08FA60A9-10E1-4ACD-819C-17801FAD7671"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/4876","source":"cve@mitre.org"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1220","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.osvdb.org/4876","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1220","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0392","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in ksu in Kerberos 5 allows local users to gain root privileges."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:cygnus_network_security:4.0:*:*:*:*:*:*:*","matchCriteriaId":"05857121-8827-45FD-886F-4269E0336036"},{"vulnerable":true,"criteria":"cpe:2.3:a:cygnus:kerbnet:5.0:*:*:*:*:*:*:*","matchCriteriaId":"EE1B0821-64F1-46E3-8DD3-12FFD1B037F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos:4.0:*:*:*:*:*:*:*","matchCriteriaId":"AFB8BD89-F049-4C3B-8744-E8D00D752DE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.0:*:*:*:*:*:*:*","matchCriteriaId":"08FA60A9-10E1-4ACD-819C-17801FAD7671"},{"vulnerable":true,"criteria":"cpe:2.3:a:mit:kerberos_5:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"E47F0770-67D7-42EE-A1AD-9D5B5E83BF2B"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:alpha:*:*:*:*:*","matchCriteriaId":"344610A8-DB6D-4407-9304-916C419F648C"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:i386:*:*:*:*:*","matchCriteriaId":"B7EC2B95-4715-4EC9-A10A-2542501F8A61"},{"vulnerable":true,"criteria":"cpe:2.3:o:redhat:linux:6.2:*:sparc:*:*:*:*:*","matchCriteriaId":"64775BEF-2E53-43CA-8639-A7E54F6F4222"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"cve@mitre.org","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1220","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0184.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/freebsd/2000-05/0295.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-2000-06.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"]},{"url":"http://www.redhat.com/support/errata/RHSA-2000-025.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1220","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0393","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The KDE kscd program does not drop privileges when executing a program specified in a user's SHELL environmental variable, which allows the user to gain privileges by specifying an alternate program to execute."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.1:*:*:*:*:*:*:*","matchCriteriaId":"55B38F8C-9451-441B-BCD8-E41C1A2231DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D04A4717-229D-4E20-8FD2-DC13757B0AC5"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.2:*:*:*:*:*:*:*","matchCriteriaId":"D6767505-CFD5-4C66-A67A-4740E2994CC8"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:2.0_beta:*:*:*:*:*:*:*","matchCriteriaId":"FC14C38A-AAA8-463E-AA7C-F16C6CB3A3EE"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0172.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_50.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1206","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0172.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_50.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1206","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0395","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in CProxy 3.3 allows remote users to cause a denial of service via a long HTTP request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:computalynx:cproxy_server:3.3sp2:*:*:*:*:*:*:*","matchCriteriaId":"3861E18D-7B9F-4249-9900-2382F08C7346"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1213","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=007d01bfbf48%24e44f0e40%2401dc11ac%40peopletel.org","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1213","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=007d01bfbf48%24e44f0e40%2401dc11ac%40peopletel.org","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0405","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in L0pht AntiSniff allows remote attackers to execute arbitrary commands via a malformed DNS response packet."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:atstake:antisniff:1.0:*:researchers:*:*:*:*:*","matchCriteriaId":"AC219D32-93D7-4292-AF1A-4A0DB386AB1E"},{"vulnerable":true,"criteria":"cpe:2.3:a:atstake:antisniff:1.0.1:*:*:*:*:*:*:*","matchCriteriaId":"10624CE0-7BDC-4057-BD49-E6CCE5DC366B"}]}]}],"references":[{"url":"http://www.l0pht.com/advisories/asniff_advisory.txt","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/3179","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1207","source":"cve@mitre.org"},{"url":"http://www.l0pht.com/advisories/asniff_advisory.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/3179","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1207","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0432","sourceIdentifier":"cve@mitre.org","published":"2000-05-16T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The calender.pl and the calendar_admin.pl calendar scripts by Matt Kruse allow remote attackers to execute arbitrary commands via shell metacharacters."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:matt_kruse:calendar_script:2.2:*:*:*:*:*:*:*","matchCriteriaId":"E08A53C7-6E35-4ED3-8428-91A16664556B"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0173.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1215","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0173.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1215","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-1999-1008","sourceIdentifier":"cve@mitre.org","published":"2000-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"xsoldier program allows local users to gain root access via a long argument."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"E4853E92-5E0A-47B9-A343-D5BEE87D2C27"}]}]}],"references":[{"url":"http://marc.info/?l=freebsd-security&m=94531826621620&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/871","source":"cve@mitre.org"},{"url":"http://marc.info/?l=freebsd-security&m=94531826621620&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/871","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0350","sourceIdentifier":"cve@mitre.org","published":"2000-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A debugging feature in NetworkICE ICEcap 2.0.23 and earlier is enabled, which allows a remote attacker to bypass the weak authentication and post unencrypted events."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:networkice:icecap_manager:*:*:*:*:*:*:*:*","versionEndIncluding":"2.0.23","matchCriteriaId":"01583654-7EDC-468F-B284-A4EE70304534"}]}]}],"references":[{"url":"http://advice.networkice.com/advice/Support/KB/q000166/","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/312","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1216","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2220","source":"cve@mitre.org"},{"url":"http://advice.networkice.com/advice/Support/KB/q000166/","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/312","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1216","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2220","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0417","sourceIdentifier":"cve@mitre.org","published":"2000-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The HTTP administration interface to the Cayman 3220-H DSL router allows remote attackers to cause a denial of service via a long username or password."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:3220-h_dsl_router:1.0:*:*:*:*:*:*:*","matchCriteriaId":"F0C4894F-C634-4830-B0D8-F6158C074A89"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.3build_r1:*:*:*:*:*:*:*","matchCriteriaId":"3E87B9E4-3AF8-46D3-B2EF-23F22DBE77AA"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.3build_r2:*:*:*:*:*:*:*","matchCriteriaId":"9E294847-D685-4D03-B92B-D78C3B4FDFC8"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.5build_r0:*:*:*:*:*:*:*","matchCriteriaId":"DF8ECB8A-EDFF-461D-9F6A-80EB8DE9EDEB"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0075.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0280.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1219","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0075.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0280.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1219","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0464","sourceIdentifier":"cve@mitre.org","published":"2000-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.x and 5.x allows remote attackers to execute arbitrary commands via a buffer overflow in the ActiveX parameter parsing capability, aka the \"Malformed Component Attribute\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:C/I:C/A:C","baseScore":7.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":4.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0.1:*:*:*:*:*:*:*","matchCriteriaId":"42502347-DD40-4F8C-9861-C0A88A3F8608"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*","matchCriteriaId":"6219D36E-9E2C-4DC7-8FD5-FAD144A333F6"}]}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=261257","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1223","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=261257","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1223","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0465","sourceIdentifier":"cve@mitre.org","published":"2000-05-17T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Internet Explorer 4.x and 5.x does not properly verify the domain of a  frame within a browser window, which allows a remote attacker to read client files via the frame, aka the \"Frame Domain Verification\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:P/I:P/A:P","baseScore":5.1,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":4.9,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*","matchCriteriaId":"A5B815D9-BC21-4A17-AF00-B8AD181027D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6B8985B-B927-4928-B1DB-18E29F796992"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.01:*:*:*:*:*:*:*","matchCriteriaId":"6219D36E-9E2C-4DC7-8FD5-FAD144A333F6"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:internet_explorer:5.5:preview:*:*:*:*:*:*","matchCriteriaId":"8E93C22E-812E-4CDA-9850-2386CE1E817A"}]}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=251108","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=255676","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1224","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=251108","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=255676","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1224","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-033","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0394","sourceIdentifier":"cve@mitre.org","published":"2000-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetProwler 3.0 allows remote attackers to cause a denial of service by sending malformed IP packets that trigger NetProwler's Man-in-the-Middle signature."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:axent:netprowler:3.0:*:*:*:*:*:*:*","matchCriteriaId":"B2EFBF71-2A4B-4714-A129-AA9D278A9E4A"}]}]}],"references":[{"url":"http://marc.info/?l=bugtraq&m=95878603510835&w=2","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1225","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=392AD3B3.3E9BE3EA%40axent.com","source":"cve@mitre.org"},{"url":"http://marc.info/?l=bugtraq&m=95878603510835&w=2","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1225","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=392AD3B3.3E9BE3EA%40axent.com","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0437","sourceIdentifier":"cve@mitre.org","published":"2000-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the CyberPatrol daemon \"cyberdaemon\" used in gauntlet and WebShield allows remote attackers to cause a denial of service or execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:gauntlet_firewall:4.1:*:*:*:*:*:*:*","matchCriteriaId":"1635EFBA-AD1C-4C02-B714-A11E78600703"},{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:gauntlet_firewall:4.2:*:*:*:*:*:*:*","matchCriteriaId":"342EA025-24C8-440F-9D63-B6808198C444"},{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:gauntlet_firewall:5.0:*:*:*:*:*:*:*","matchCriteriaId":"7A91D5DB-D09F-4CF6-99B2-B444FAD91A4B"},{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:gauntlet_firewall:5.5:*:*:*:*:*:*:*","matchCriteriaId":"E0B3829B-8730-47B8-BB3F-7D9EF10A7886"},{"vulnerable":true,"criteria":"cpe:2.3:a:network_associates:webshield:4.0:*:solaris:*:*:*:*:*","matchCriteriaId":"07C41A94-7162-4866-8B3E-B3D23380095E"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:network_associates:webshield_e-ppliance:100.0:*:*:*:*:*:*:*","matchCriteriaId":"140F366D-B19D-4BEC-8211-894FA2ADA381"},{"vulnerable":true,"criteria":"cpe:2.3:h:network_associates:webshield_e-ppliance:300.0:*:*:*:*:*:*:*","matchCriteriaId":"2AC41A6A-E973-4C18-A481-0D29349ECB3E"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0249.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/322","source":"cve@mitre.org"},{"url":"http://www.pgp.com/jump/gauntlet_advisory.asp","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1234","source":"cve@mitre.org"},{"url":"http://www.tis.com/support/cyberadvisory.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0249.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/322","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.pgp.com/jump/gauntlet_advisory.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1234","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.tis.com/support/cyberadvisory.html","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0450","sourceIdentifier":"cve@mitre.org","published":"2000-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in bbd server in Big Brother System and Network Monitor allows an attacker to execute arbitrary commands."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:sean_macguire:big_brother:1.3b:*:*:*:*:*:*:*","matchCriteriaId":"073613CC-638B-46A9-8BBD-A1D313864BD2"},{"vulnerable":true,"criteria":"cpe:2.3:a:sean_macguire:big_brother:1.4:*:*:*:*:*:*:*","matchCriteriaId":"D29324C9-7C4A-4A5A-A595-A0666498AC88"},{"vulnerable":true,"criteria":"cpe:2.3:a:sean_macguire:big_brother:1.4g:*:*:*:*:*:*:*","matchCriteriaId":"9FDEC456-9591-4195-A251-2196F3049A22"},{"vulnerable":true,"criteria":"cpe:2.3:a:sean_macguire:big_brother:1.4h1:*:*:*:*:*:*:*","matchCriteriaId":"3A6B2570-E8A4-41C8-A5AD-D64333A133E6"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0216.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1257","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0216.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1257","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0452","sourceIdentifier":"cve@mitre.org","published":"2000-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the ESMTP service of Lotus Domino Server 5.0.1 allows remote attackers to cause a denial of service via a long MAIL FROM command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_enterprise_server:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"6256A050-8C38-4CC2-86F2-3364FAABDE59"},{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_enterprise_server:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"C0A1146D-E261-4AE9-8852-5988B3AB5865"},{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_enterprise_server:5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"E5FD1CC4-DFD4-4A32-AD45-353583463916"},{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_mail_server:5.0.1:*:*:*:*:*:*:*","matchCriteriaId":"EF6E13D4-7764-4A02-B599-B68BB45F4AD3"},{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_mail_server:5.0.2:*:*:*:*:*:*:*","matchCriteriaId":"55BC4294-9363-406C-8C64-964A95DA2052"},{"vulnerable":true,"criteria":"cpe:2.3:a:lotus:domino_mail_server:5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"DB86430D-3A2D-4A07-A94B-731640E24269"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0219.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/321","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1229","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0219.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/321","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1229","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0453","sourceIdentifier":"cve@mitre.org","published":"2000-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"XFree86 3.3.x and 4.0 allows a user to cause a denial of service via a negative counter value in a malformed TCP packet that is sent to port 6000."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:x11r6:3.3.5:*:*:*:*:*:*:*","matchCriteriaId":"B43D5F86-97B2-4175-8ED7-1F937850F9DB"},{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:x11r6:3.3.6:*:*:*:*:*:*:*","matchCriteriaId":"0946A224-6A0C-4DE3-89F9-200682431737"},{"vulnerable":true,"criteria":"cpe:2.3:a:xfree86_project:x11r6:4.0:*:*:*:*:*:*:*","matchCriteriaId":"F33E5444-E178-4F49-BDA1-DE576D8526EE"}]}]}],"references":[{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-012.0.txt","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0223.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1235","source":"cve@mitre.org"},{"url":"ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2000-012.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0223.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1235","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0463","sourceIdentifier":"cve@mitre.org","published":"2000-05-18T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"BeOS 5.0 allows remote attackers to cause a denial of service via fragmented TCP packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:be:beos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6EBFAEE-C1D9-48AE-AFE3-2C44CAC74616"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0197.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1222","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0197.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1222","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0305","sourceIdentifier":"cve@mitre.org","published":"2000-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Windows 95, Windows 98, Windows 2000, Windows NT 4.0, and Terminal Server systems allow a remote attacker to cause a denial of service by sending a large number of identical fragmented IP packets, aka jolt2 or the \"IP Fragment Reassembly\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:C","baseScore":7.8,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-399"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:be:beos:5.0:*:*:*:*:*:*:*","matchCriteriaId":"E6EBFAEE-C1D9-48AE-AFE3-2C44CAC74616"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]}],"references":[{"url":"http://www.securityfocus.com/bid/1236","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2240","source":"cve@mitre.org","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-029","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1236","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"http://www.securityfocus.com/templates/advisory.html?id=2240","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"]},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-029","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0436","sourceIdentifier":"cve@mitre.org","published":"2000-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"MetaProducts Offline Explorer 1.2 and earlier allows remote attackers to access arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:metaproducts:offline_explorer:1.0:*:*:*:*:*:*:*","matchCriteriaId":"5C98E0B7-075B-47BC-8D33-D4A9F86FFA1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:metaproducts:offline_explorer:1.1:*:*:*:*:*:*:*","matchCriteriaId":"01BA0C6F-7853-4CDE-8F38-4C2D81234BB7"},{"vulnerable":true,"criteria":"cpe:2.3:a:metaproducts:offline_explorer:1.2:*:*:*:*:*:*:*","matchCriteriaId":"26C7E0F0-0035-4BCF-ACB4-CF32F43753A4"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0254.html","source":"cve@mitre.org"},{"url":"http://www.metaproducts.com/mpOE-HY.html","source":"cve@mitre.org","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/1231","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0254.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.metaproducts.com/mpOE-HY.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"]},{"url":"http://www.securityfocus.com/bid/1231","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0451","sourceIdentifier":"cve@mitre.org","published":"2000-05-19T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Intel express 8100 ISDN router allows remote attackers to cause a denial of service via oversized or fragmented ICMP packets."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:intel:express_8100:*:*:*:*:*:*:*:*","matchCriteriaId":"3218FE18-1E23-43F6-930D-8889EB1F845F"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0229.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1228","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0229.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1228","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0431","sourceIdentifier":"cve@mitre.org","published":"2000-05-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Cobalt RaQ2 and RaQ3 does not properly set the access permissions and ownership for files that are uploaded via FrontPage, which allows attackers to bypass cgiwrap and modify files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*","matchCriteriaId":"0C1E1872-D16C-4848-800C-32B80DD59494"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0305.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1346","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1238","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000523100045.B11049%40HiWAAY.net","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0305.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1346","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1238","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://www.securityfocus.com/templates/archive.pike?list=1&msg=20000523100045.B11049%40HiWAAY.net","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0438","sourceIdentifier":"cve@mitre.org","published":"2000-05-22T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in fdmount on Linux systems allows local users in the \"floppy\" group to execute arbitrary commands via a long mountpoint parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"5B4C973D-1172-4D4C-AF96-9968ED317D36"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*","matchCriteriaId":"06F2131E-F9F2-4E65-B95C-B52DB25C69F5"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*","matchCriteriaId":"E6732144-10D4-4114-A7DA-32157EE3EF38"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*","matchCriteriaId":"125918E7-53BB-407A-8D95-5D95CDF39A88"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*","matchCriteriaId":"CE0BBA4F-C61A-4A8E-A7E2-CE0DF76DF592"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:3.9:*:*:*:*:*:*:*","matchCriteriaId":"15CB96AA-7CC1-4F01-8E9A-F85CD851594A"},{"vulnerable":true,"criteria":"cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*","matchCriteriaId":"CC3B1DD9-10B5-40FE-AE56-D068C41653DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.2:*:*:*:*:*:*:*","matchCriteriaId":"451453AC-65FF-4E3B-9AC1-2DDB2E2182E4"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.3:*:*:*:*:*:*:*","matchCriteriaId":"7716120D-5110-42B0-A574-9AA2AC8D3C32"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.4:*:*:*:*:*:*:*","matchCriteriaId":"CB4C8426-CAF2-4366-94C0-1BA1C544FB6F"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:4.4.1:*:*:*:*:*:*:*","matchCriteriaId":"5CC7D746-B98B-4FAF-B816-57222759A344"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.0:*:*:*:*:*:*:*","matchCriteriaId":"830D48B8-D21D-4D31-99A1-20C231804DBE"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.1:*:*:*:*:*:*:*","matchCriteriaId":"5C0BBDD2-9FF9-4CB7-BCAF-D4AF15DC2C7C"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.2:*:*:*:*:*:*:*","matchCriteriaId":"D1C826AA-6E2F-4DAC-A7A2-9F47729B5DA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:5.3:*:*:*:*:*:*:*","matchCriteriaId":"BCC94EF9-5872-402F-B2FC-06331A924BB2"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"F163E145-09F7-4BE2-9B46-5B6713070BAB"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.1:*:*:*:*:*:*:*","matchCriteriaId":"124E1802-7984-45ED-8A92-393FC20662FD"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.3:*:*:*:*:*:*:*","matchCriteriaId":"0AD0FF64-05DF-48C2-9BB5-FD993121FB2E"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*","matchCriteriaId":"7786607A-362E-4817-A17E-C76D6A1F737D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"C9E7D75A-333E-4C63-9593-F64ABA5D1CE3"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0:*:*:*:*:*:*:*","matchCriteriaId":"981A0654-C17D-48BB-A8B3-A728CB159C33"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"2AA8956D-F533-42BA-A06B-7CDB0A267B2F"},{"vulnerable":true,"criteria":"cpe:2.3:o:turbolinux:turbolinux:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"C6619B49-8A89-4600-A47F-A39C8BF54259"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0245.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1239","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0245.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1239","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0418","sourceIdentifier":"cve@mitre.org","published":"2000-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The Cayman 3220-H DSL router allows remote attackers to cause a denial of service via oversized ICMP echo (ping) requests."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:3220-h_dsl_router:1.0:*:*:*:*:*:*:*","matchCriteriaId":"F0C4894F-C634-4830-B0D8-F6158C074A89"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.3:*:*:*:*:*:*:*","matchCriteriaId":"6894F902-4173-4A61-A836-39FC875A0C1D"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.3build_r1:*:*:*:*:*:*:*","matchCriteriaId":"3E87B9E4-3AF8-46D3-B2EF-23F22DBE77AA"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.3build_r2:*:*:*:*:*:*:*","matchCriteriaId":"9E294847-D685-4D03-B92B-D78C3B4FDFC8"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.5build_r0:*:*:*:*:*:*:*","matchCriteriaId":"DF8ECB8A-EDFF-461D-9F6A-80EB8DE9EDEB"},{"vulnerable":true,"criteria":"cpe:2.3:h:cayman:gatorsurf:5.5build_r1:*:*:*:*:*:*:*","matchCriteriaId":"075DC008-B7E8-4707-BB69-BBC63E03C736"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0280.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1240","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0280.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1240","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0551","sourceIdentifier":"cve@mitre.org","published":"2000-05-23T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The file transfer mechanism in Danware NetOp 6.0 does not provide authentication, which allows remote attackers to access and modify arbitrary files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:danware_data:netop:6.0:*:*:*:*:*:*:*","matchCriteriaId":"11D50435-13B0-4823-97FF-E7740C616101"},{"vulnerable":true,"criteria":"cpe:2.3:a:danware_data:netop:6.50:*:*:*:*:*:*:*","matchCriteriaId":"6C8A7924-FFE7-45E7-8D72-02790A3662E6"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0339.html","source":"cve@mitre.org","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1263","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4569","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0339.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1263","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4569","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0396","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The add.exe program in the Carello shopping cart software allows remote attackers to duplicate files on the server, which could allow the attacker to read source code for web scripts such as .ASP files."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pacific_software:carello:1.2.1:*:*:*:*:*:*:*","matchCriteriaId":"888076E8-B384-467E-9F6E-5FA517DAA4D9"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0285.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1245","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0285.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1245","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0398","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in wconsole.dll in Rockliffe MailSite Management Agent allows remote attackers to execute arbitrary commands via a long query_string parameter in the HTTP GET request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:rockliffe:mailsite:4.2.10:*:*:*:*:*:*:*","matchCriteriaId":"DEDA707F-1198-4978-96A3-15FFC9D1BA28"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0286.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1244","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0286.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1244","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0399","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in MDaemon POP server allows remote attackers to cause a denial of service via a long user name."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:alt-n:mdaemon:3.0.3:*:*:*:*:*:*:*","matchCriteriaId":"74E791DD-1376-4E77-9D7B-C66E88146248"},{"vulnerable":true,"criteria":"cpe:2.3:a:alt-n:mdaemon:3.1_beta:*:*:*:*:*:*:*","matchCriteriaId":"6906B4D1-9336-4E52-A1D4-1402F5EF2BBA"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1250","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0301.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1250","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0441","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Vulnerability in AIX 3.2.x and 4.x allows local users to gain write access to files on locally or remotely mounted AIX filesystems."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:P/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*","matchCriteriaId":"DD5E0678-45C7-492A-963C-897494D6878F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*","matchCriteriaId":"E55C28A7-CD21-47CD-AA50-E8B2D89A18E8"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*","matchCriteriaId":"D3C00FC9-AD97-4226-A0EA-7DB14AA592DE"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*","matchCriteriaId":"FBF25306-E7C2-4F9A-A809-4779A6C0A079"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*","matchCriteriaId":"B3BA7775-30F2-4CA0-BA6E-70ED12A48D90"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*","matchCriteriaId":"FB038A89-1CA6-4313-B7CE-56C894945FFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*","matchCriteriaId":"2B3BC86F-5718-4232-BFFF-6244A7C09B8F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*","matchCriteriaId":"E6118CC1-6E51-4E1B-8F58-43B337515222"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*","matchCriteriaId":"F3D3B348-270F-4209-B31A-2B40F5E4A601"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*","matchCriteriaId":"05F20EC2-ADE6-4F96-A2E7-1DCCA819D657"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*","matchCriteriaId":"91D7C561-4D23-430B-A7D8-137E52B08FF5"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*","matchCriteriaId":"11ACD012-F05F-45CD-A170-96CBAA42FFE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*","matchCriteriaId":"55919E74-09E7-44BA-9941-D1B69BB1692F"},{"vulnerable":true,"criteria":"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*","matchCriteriaId":"45F3C5D8-8BC3-44EB-917A-D0BA051D3D9D"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0275.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1241","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0275.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1241","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0442","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Qpopper 2.53 and earlier allows local users to gain privileges via a formatting string in the From: header, which is processed by the euidl command."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:2.52:*:*:*:*:*:*:*","matchCriteriaId":"D691E685-7C2D-4EB8-9088-7F9D0E905F31"},{"vulnerable":true,"criteria":"cpe:2.3:a:qualcomm:qpopper:2.53:*:*:*:*:*:*:*","matchCriteriaId":"B223F362-D00F-4D93-8328-33FF1CE331EA"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_2:*:*:*:*:*:*:*:*","matchCriteriaId":"0F6DDD9F-5C58-4092-BF3D-332E2E566182"},{"vulnerable":true,"criteria":"cpe:2.3:h:sun:cobalt_raq_3i:*:*:*:*:*:*:*:*","matchCriteriaId":"0C1E1872-D16C-4848-800C-32B80DD59494"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_51.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1242","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0267.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_51.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1242","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0443","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The web interface server in HP Web JetAdmin 5.6 allows remote attackers to read arbitrary files via a .. (dot dot) attack."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:jetadmin:6.0:*:*:*:*:*:*:*","matchCriteriaId":"17A6954A-D8E0-4ADF-BB64-329D7589F38A"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0281.html","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1350","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1243","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0281.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1350","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1243","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0444","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"HP Web JetAdmin 6.0 allows remote attackers to cause a denial of service via a malformed URL to port 8000."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:hp:jetadmin:6.0:*:*:*:*:*:*:*","matchCriteriaId":"17A6954A-D8E0-4ADF-BB64-329D7589F38A"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0277.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1246","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0277.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1246","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0445","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The pgpk command in PGP 5.x on Unix systems uses an insufficiently random data source for non-interactive key pair generation, which may produce predictable keys."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:pgp:pgp:5.0_linux:*:*:*:*:*:*:*","matchCriteriaId":"C0A66DFA-F3E7-46DA-9D14-9F7E6AE434C8"},{"vulnerable":true,"criteria":"cpe:2.3:a:pgp:pgp:5.0i:*:*:*:*:*:*:*","matchCriteriaId":"E8B8CF74-2F7D-418A-B271-07A39A267C1F"},{"vulnerable":true,"criteria":"cpe:2.3:a:pgp:pgp:6.5_linux:*:*:*:*:*:*:*","matchCriteriaId":"39EE190C-D0F1-41E4-8A27-B399760A2797"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0273.html","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-09.html","source":"cve@mitre.org","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/1355","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1251","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0273.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.cert.org/advisories/CA-2000-09.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"]},{"url":"http://www.osvdb.org/1355","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1251","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0446","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in MDBMS database server allows remote attackers to execute arbitrary commands via a long string."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":true,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:marty_bochane:mdbms:0.9_xbx:*:*:*:*:*:*:*","matchCriteriaId":"15002E13-4631-42A0-9AF4-64BD1B020A08"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0274.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1252","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0274.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1252","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0491","sourceIdentifier":"cve@mitre.org","published":"2000-05-24T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in the XDMCP parsing code of GNOME gdm, KDE kdm, and wdm allows remote attackers to execute arbitrary commands or cause a denial of service via a long FORWARD_QUERY request."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10.0,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:gnome:gdm:1.0:*:*:*:*:*:*:*","matchCriteriaId":"E2D650E6-F568-4B7F-8913-3DC10E8F4201"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:caldera:openlinux:*:*:*:*:*:*:*:*","matchCriteriaId":"4EC3F7E5-5D49-471B-A705-ADD2642E5B46"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.2:*:*:*:*:*:*:*","matchCriteriaId":"1B67020A-6942-4478-B501-764147C4970D"},{"vulnerable":true,"criteria":"cpe:2.3:o:suse:suse_linux:6.4:*:*:*:*:*:*:*","matchCriteriaId":"7786607A-362E-4817-A17E-C76D6A1F737D"}]}]}],"references":[{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-013.0.txt","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0241.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0025.html","source":"cve@mitre.org"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_49.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1233","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1279","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1370","source":"cve@mitre.org"},{"url":"ftp://ftp.calderasystems.com/pub/OpenLinux/security/CSSA-2000-013.0.txt","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0241.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0025.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.novell.com/linux/security/advisories/suse_security_announce_49.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1233","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1279","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1370","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0403","sourceIdentifier":"cve@mitre.org","published":"2000-05-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The CIFS Computer Browser service on Windows NT 4.0 allows a remote attacker to cause a denial of service by sending a large number of host announcement requests to the master browse tables, aka the \"HostAnnouncement Flooding\" or \"HostAnnouncement Frame\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=263307","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1261","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-036","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=263307","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1261","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-036","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0404","sourceIdentifier":"cve@mitre.org","published":"2000-05-25T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The CIFS Computer Browser service allows remote attackers to cause a denial of service by sending a ResetBrowser frame to the Master Browser, aka the \"ResetBrowser Frame\" vulnerability."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:terminal_server:*:*:*:*:*:*:*:*","matchCriteriaId":"40242161-D5AD-4314-AB95-E61292C49DF2"}]}]},{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*","matchCriteriaId":"4E545C63-FE9C-4CA1-AF0F-D999D84D2AFD"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*","matchCriteriaId":"82F7322B-8022-4D0B-ADB3-D0F5B6F20309"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_98:*:gold:*:*:*:*:*:*","matchCriteriaId":"2D3B703C-79B2-4FA2-9E12-713AB977A880"},{"vulnerable":true,"criteria":"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*","matchCriteriaId":"E53CDA8E-50A8-4509-B070-CCA5604FFB21"}]}]}],"references":[{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=262694","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1262","source":"cve@mitre.org"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-036","source":"cve@mitre.org"},{"url":"http://www.microsoft.com/technet/support/kb.asp?ID=262694","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1262","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2000/ms00-036","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0517","sourceIdentifier":"cve@mitre.org","published":"2000-05-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Netscape 4.73 and earlier does not properly warn users about a potentially invalid certificate if the user has previously accepted the certificate for a different web site, which could allow remote attackers to spoof a legitimate web site by compromising that site's DNS information."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:N/A:N","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*","matchCriteriaId":"209C7BB1-EFDF-43AB-9FB6-DF67465DEAEF"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.5:*:*:*:*:*:*:*","matchCriteriaId":"4E9A5461-B0F2-49DB-A69C-3D2D27709647"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.6:*:*:*:*:*:*:*","matchCriteriaId":"529E3F71-6016-461D-A162-0DBDD5505389"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.7:*:*:*:*:*:*:*","matchCriteriaId":"38FD74F5-12ED-4049-B06F-0F22A0254C0F"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.51:*:*:*:*:*:*:*","matchCriteriaId":"918BE44C-8D64-4040-BC74-802AA3FA4E10"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.61:*:*:*:*:*:*:*","matchCriteriaId":"6AA534C4-9411-44EC-AA34-2287C79AD235"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.72:*:*:*:*:*:*:*","matchCriteriaId":"3A4E8588-A941-4759-B41C-00F193F2C63B"},{"vulnerable":true,"criteria":"cpe:2.3:a:netscape:communicator:4.73:*:*:*:*:*:*:*","matchCriteriaId":"3E48C051-EB45-4262-86C2-2333FD5C7745"}]}]}],"references":[{"url":"http://www.cert.org/advisories/CA-2000-08.html","source":"cve@mitre.org","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/1260","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4550","source":"cve@mitre.org"},{"url":"http://www.cert.org/advisories/CA-2000-08.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Third Party Advisory","US Government Resource"]},{"url":"http://www.securityfocus.com/bid/1260","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4550","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0553","sourceIdentifier":"cve@mitre.org","published":"2000-05-26T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Race condition in IPFilter firewall 3.4.3 and earlier, when configured with overlapping \"return-rst\" and \"keep state\" rules, allows remote attackers to bypass access restrictions."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:H/Au:N/C:N/I:P/A:N","baseScore":2.6,"accessVector":"NETWORK","accessComplexity":"HIGH","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":4.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.3.15:*:*:*:*:*:*:*","matchCriteriaId":"5D5F9210-DD20-4D86-B4F0-74F60A263F5E"},{"vulnerable":true,"criteria":"cpe:2.3:a:darren_reed:ipfilter:3.4.3:*:*:*:*:*:*:*","matchCriteriaId":"ACB9F76C-D145-4347-9A4C-1BD243AE68FB"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html","source":"cve@mitre.org","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1377","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1308","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4994","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0326.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Vendor Advisory"]},{"url":"http://www.osvdb.org/1377","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1308","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/4994","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0460","sourceIdentifier":"cve@mitre.org","published":"2000-05-27T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in KDE kdesud on Linux allows local uses to gain privileges via a long DISPLAY environmental variable."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.1:*:*:*:*:*:*:*","matchCriteriaId":"55B38F8C-9451-441B-BCD8-E41C1A2231DD"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"D04A4717-229D-4E20-8FD2-DC13757B0AC5"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.1.2:*:*:*:*:*:*:*","matchCriteriaId":"F472ECE0-821E-4A20-B6FC-CC4FC5D1BA36"},{"vulnerable":true,"criteria":"cpe:2.3:o:kde:kde:1.2:*:*:*:*:*:*:*","matchCriteriaId":"D6767505-CFD5-4C66-A67A-4740E2994CC8"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0353.html","source":"cve@mitre.org","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1274","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0353.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Vendor Advisory"]},{"url":"http://www.securityfocus.com/bid/1274","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0456","sourceIdentifier":"cve@mitre.org","published":"2000-05-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"NetBSD 1.4.2 and earlier allows local users to cause a denial of service by repeatedly running certain system calls in the kernel which do not yield the CPU, aka \"cpu-hog\"."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*","matchCriteriaId":"247ABD95-74CA-45B8-8729-3C35C9E11186"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*","matchCriteriaId":"1D4C44E8-075A-4B48-88DA-2CAC25CDF159"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*","matchCriteriaId":"19D1E7AC-79B6-4136-ADB2-06BEE9773795"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:x86:*:*:*:*:*","matchCriteriaId":"E2EE8A19-8AB1-4283-95EA-9EE3C7E5DED7"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*","matchCriteriaId":"6FA1C84C-6624-4032-8D0E-5EBB054F5224"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*","matchCriteriaId":"06B9ADAD-ADDC-47AC-9924-B31B17DDF163"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*","matchCriteriaId":"6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*","matchCriteriaId":"537FD523-1D44-4D85-AED1-C092E0155CF2"}]}]}],"references":[{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-005.txt.asc","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1365","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1272","source":"cve@mitre.org"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-005.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1365","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1272","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0462","sourceIdentifier":"cve@mitre.org","published":"2000-05-28T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"ftpd in NetBSD 1.4.2 does not properly parse entries in /etc/ftpchroot and does not chroot the specified users, which allows those users to access other files outside of their home directory."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*","matchCriteriaId":"6FA1C84C-6624-4032-8D0E-5EBB054F5224"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*","matchCriteriaId":"06B9ADAD-ADDC-47AC-9924-B31B17DDF163"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*","matchCriteriaId":"6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*","matchCriteriaId":"537FD523-1D44-4D85-AED1-C092E0155CF2"}]}]}],"references":[{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-006.txt.asc","source":"cve@mitre.org"},{"url":"http://www.osvdb.org/1366","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1273","source":"cve@mitre.org"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-006.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.osvdb.org/1366","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1273","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0454","sourceIdentifier":"cve@mitre.org","published":"2000-05-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in Linux cdrecord allows local users to gain privileges via the dev parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:mandrakesoft:mandrake_linux:7.0:*:*:*:*:*:*:*","matchCriteriaId":"E4853E92-5E0A-47B9-A343-D5BEE87D2C27"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0367.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0434.html","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0019.html","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1265","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0367.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0434.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-06/0019.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1265","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0455","sourceIdentifier":"cve@mitre.org","published":"2000-05-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"Buffer overflow in xlockmore xlock program version 4.16 and earlier allows local users to read sensitive data from memory via a long -mode option."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:P/I:N/A:N","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"NONE","availabilityImpact":"NONE"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:david_bagley:xlock:4.16:*:*:*:*:*:*:*","matchCriteriaId":"DE36D516-F942-4398-BEFE-9C7E28CCE2DA"}]}]}],"references":[{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-003.txt.asc","source":"cve@mitre.org"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0375.html","source":"cve@mitre.org"},{"url":"http://www.nai.com/nai_labs/asp_set/advisory/41initialized.asp","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1267","source":"cve@mitre.org"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-003.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://archives.neohapsis.com/archives/bugtraq/2000-05/0375.html","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.nai.com/nai_labs/asp_set/advisory/41initialized.asp","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1267","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0461","sourceIdentifier":"cve@mitre.org","published":"2000-05-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The undocumented semconfig system call in BSD freezes the state of semaphores, which allows local users to cause a denial of service of the semaphore system by using the semconfig call."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:N/I:N/A:P","baseScore":2.1,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"LOW","exploitabilityScore":3.9,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*","matchCriteriaId":"C496B665-70DA-4B98-A5D1-E2935C0CE840"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*","matchCriteriaId":"F1F098C1-D09E-49B4-9B51-E84B6C4EA6CD"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*","matchCriteriaId":"34797660-41F5-4358-B70F-2A40DE48F182"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*","matchCriteriaId":"27C9E23D-AB82-4AE1-873E-C5493BB96AA1"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*","matchCriteriaId":"4054D69F-596F-4EB4-BE9A-E2478343F55A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*","matchCriteriaId":"CA26ABBE-9973-45FA-9E9B-82170B751219"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*","matchCriteriaId":"7891202C-62AF-4590-9E5F-3514FDA2B38E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*","matchCriteriaId":"BF8F9B2F-E898-4F87-A245-32A41748587B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*","matchCriteriaId":"183667CA-6DF1-4BFB-AE32-9ABF55B7283A"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*","matchCriteriaId":"EBDDEC3F-52EB-4E1E-84C4-B472600059EC"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*","matchCriteriaId":"B58E02AE-38B4-466E-BF73-2F0B80AF7BA5"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*","matchCriteriaId":"3928D5CF-6FC0-434C-8A80-ABDBF346C2C9"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*","matchCriteriaId":"314BA420-4C74-4060-8ACE-D7A7C041CF2B"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*","matchCriteriaId":"2EAD7613-A5B3-4621-B981-290C7C6B8BA0"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*","matchCriteriaId":"D1CA3337-9BEE-49C5-9EDE-8CDBE5580537"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*","matchCriteriaId":"EE38C50A-81FE-412E-9717-3672FAE6A6F4"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.1:*:*:*:*:*:*:*","matchCriteriaId":"263F3734-7076-4EA8-B4C0-F37CFC4E979E"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.2:*:*:*:*:*:*:*","matchCriteriaId":"0419DD66-FF66-48BC-AD3B-F6AFD0551E36"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.3:*:*:*:*:*:*:*","matchCriteriaId":"C3518628-08E5-4AD7-AAF6-A4E38F1CDE2C"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:3.4:*:*:*:*:*:*:*","matchCriteriaId":"B982342C-1981-4C55-8044-AFE4D87623DF"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.0:*:*:*:*:*:*:*","matchCriteriaId":"D0A585A1-FF82-418F-90F8-072458DB7816"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:4.0:alpha:*:*:*:*:*:*","matchCriteriaId":"E3F7EB61-55A5-4776-B0E7-3508920A6CEA"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*","matchCriteriaId":"61EBA52A-2D8B-4FB5-866E-AE67CE1842E7"},{"vulnerable":true,"criteria":"cpe:2.3:o:freebsd:freebsd:5.0:alpha:*:*:*:*:*:*","matchCriteriaId":"3B13D898-C1B6-44B9-8432-7DDB8A380E9E"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:alpha:*:*:*:*:*","matchCriteriaId":"247ABD95-74CA-45B8-8729-3C35C9E11186"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:arm32:*:*:*:*:*","matchCriteriaId":"1D4C44E8-075A-4B48-88DA-2CAC25CDF159"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.1:*:sparc:*:*:*:*:*","matchCriteriaId":"19D1E7AC-79B6-4136-ADB2-06BEE9773795"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:alpha:*:*:*:*:*","matchCriteriaId":"6FA1C84C-6624-4032-8D0E-5EBB054F5224"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:arm32:*:*:*:*:*","matchCriteriaId":"06B9ADAD-ADDC-47AC-9924-B31B17DDF163"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:sparc:*:*:*:*:*","matchCriteriaId":"6DC0D30E-DBF1-4FDB-80C0-80DB50D9E77A"},{"vulnerable":true,"criteria":"cpe:2.3:o:netbsd:netbsd:1.4.2:*:x86:*:*:*:*:*","matchCriteriaId":"537FD523-1D44-4D85-AED1-C092E0155CF2"}]}]}],"references":[{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc","source":"cve@mitre.org"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-004.txt.asc","source":"cve@mitre.org"},{"url":"http://www.openbsd.org/errata26.html#semconfig","source":"cve@mitre.org"},{"url":"http://www.securityfocus.com/bid/1270","source":"cve@mitre.org"},{"url":"ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-00:19.semconfig.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"ftp://ftp.netbsd.org/pub/NetBSD/misc/security/advisories/NetBSD-SA2000-004.txt.asc","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.openbsd.org/errata26.html#semconfig","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"http://www.securityfocus.com/bid/1270","source":"af854a3a-2127-422b-91ae-364da2661108"}]}},{"cve":{"id":"CVE-2000-0564","sourceIdentifier":"cve@mitre.org","published":"2000-05-29T04:00:00.000","lastModified":"2026-04-16T00:27:16.627","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"The guestbook CGI program in ICQ Web Front service for ICQ 2000a, 99b, and others allows remote attackers to cause a denial of service via a URL with a long name parameter."}],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5.0,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10.0,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"NVD-CWE-Other"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:0.99b_1.1.1.1:*:*:*:*:*:*:*","matchCriteriaId":"55BF15F6-FFF7-4A0D-A2FF-8160AB3D70C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:0.99b_v.3.19:*:*:*:*:*:*:*","matchCriteriaId":"6A5D8068-55DF-4008-98CC-4ABEED68260D"},{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:98.0a:*:*:*:*:*:*:*","matchCriteriaId":"F2CBBD4E-4E3D-4441-88B0-24A6566CCB93"},{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:99a_2.15build1701:*:*:*:*:*:*:*","matchCriteriaId":"B9CB6B89-E3B1-4096-AF07-C9E74BFCABDC"},{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:99a_2.21build1800:*:*:*:*:*:*:*","matchCriteriaId":"7181BF12-E9B6-4F8E-B1D0-3251007389D8"},{"vulnerable":true,"criteria":"cpe:2.3:a:mirabilis:icq:2000.0a:*:*:*:*:*:*:*","matchCriteriaId":"1C7B95B0-8CCB-4561-B354-80925B9769D6"}]}]}],"references":[{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0218.html","source":"cve@mitre.org","tags":["Patch","Vendor Advisory"]},{"url":"http://archives.neohapsis.com/archives/ntbugtraq/2000-q2/0218.html","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"]}]}}]}