Name
stringlengths 13
14
| Status
stringclasses 2
values | Description
stringlengths 20
2.71k
| References
stringlengths 28
30.7k
⌀ | Phase
stringlengths 18
19
⌀ | Votes
stringlengths 18
209
⌀ | Comments
stringlengths 14
8.88k
⌀ |
---|---|---|---|---|---|---|
CVE-1999-0618 | Candidate | The rexec service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0618 | XF:rexec | Modified (19990921) | ACCEPT(4) Baker, Northcutt, Ozancin, Wall | MODIFY(1) Frech | Frech> XF:decod-rexec | XF:rexec |
CVE-1999-0619 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0620 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt | Christey> XF:ypserv(261) |
CVE-1999-0621 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | MODIFY(1) Frech | REJECT(2) LeBlanc, Northcutt | LeBlanc> There is insufficient description to even know what this is. | Lots of component services related to NetBIOS run, and usually do not | constitute a problem. | Frech> associated to: | XF:nt-alerter(29) | XF:nt-messenger(69) | XF:reg-ras-gateway-enabled(2567) |
CVE-1999-0622 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0623 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt | Christey> Add "X11" to facilitate search. |
CVE-1999-0624 | Candidate | The rstat/rstatd service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0624 | XF:rstat-out | XF:rstatd | Interim (19990925) | ACCEPT(3) Baker, Northcutt, Ozancin | MODIFY(1) Frech | NOOP(2) Meunier, Wall | Frech> XF:rstat-out | XF:rstatd |
CVE-1999-0625 | Candidate | The rpc.rquotad service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0625 | Proposed (19990721) | ACCEPT(3) Baker, Northcutt, Ozancin | MODIFY(1) Frech | NOOP(1) Wall | Frech> XF:rquotad |
CVE-1999-0626 | Entry | A version of rusers is running that exposes valid user information to any entity on the network. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0626 | XF:ruser | XF:rusersd | null | null | null |
CVE-1999-0627 | Entry | The rexd service is running, which uses weak authentication that can allow an attacker to execute commands. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627 | XF:rexd | null | null | null |
CVE-1999-0628 | Entry | The rwho/rwhod service is running, which exposes machine status and user information. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628 | XF:rwhod | null | null | null |
CVE-1999-0629 | Candidate | The ident/identd service is running. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629 | Proposed (19990721) | ACCEPT(2) Baker, Ozancin | MODIFY(1) Frech | NOOP(2) Christey, Wall | REJECT(1) Northcutt | Frech> possibly XF:identd? | Christey> XF:ident-users(318) ? | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:identd-vuln(61) | XF:ident-users(318) |
CVE-1999-0630 | Candidate | The NT Alerter and Messenger services are running. | MISC:http://support.microsoft.com/support/kb/articles/q189/2/71.asp | Proposed (19990804) | ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt | Christey> http://support.microsoft.com/support/kb/articles/q189/2/71.asp |
CVE-1999-0631 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt | Christey> XF:nfs-nfsd(76) ? | Christey> Add rpc.mountd/mountd to facilitate search. |
CVE-1999-0632 | Candidate | The RPC portmapper service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0632 | Proposed (19990804) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0633 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0634 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0635 | Candidate | The echo service is running. | FULLDISC:20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html | SECUNIA:18514 | URL:http://secunia.com/advisories/18514 | Modified (20060122) | ACCEPT(3) Baker, Northcutt, Wall | REVIEWING(1) Christey | Northcutt> The method to my madness is echo is the common denom in the dos attack | Christey> How much of this is an overlap with the echo/chargen flood | problem (CVE-1999-0103)? If this is only an exposure because | of CVE-1999-0103, then maybe this should be REJECTed. |
CVE-1999-0636 | Candidate | The discard service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0636 | Proposed (19990804) | ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt | null |
CVE-1999-0637 | Candidate | The systat service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0637 | Proposed (19990804) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0638 | Candidate | The daytime service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0638 | Proposed (19990804) | ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt | null |
CVE-1999-0639 | Candidate | The chargen service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0639 | Proposed (19990804) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | REVIEWING(1) Christey | Christey> How much of this is an overlap with the echo/chargen flood | problem (CVE-1999-0103)? If this is only an exposure because | of CVE-1999-0103, then maybe this should be REJECTed. |
CVE-1999-0640 | Candidate | The Gopher service is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0640 | Proposed (19990804) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0641 | Candidate | The UUCP service is running. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641 | Proposed (19990804) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0642 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0643 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0644 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt | Christey> XF:nntp-post(88) ? |
CVE-1999-0645 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt | Christey> XF:irc-server(767) ? |
CVE-1999-0646 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0647 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Ozancin | MODIFY(1) Frech | NOOP(1) Wall | REJECT(1) Northcutt | Frech> XF:bootp |
CVE-1999-0648 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0649 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running." | null | Modified (20080731) | ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt | null |
CVE-1999-0650 | Candidate | The netstat service is running, which provides sensitive information to remote attackers. | XF:netstat(72) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/72 | Modified (20060608) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0651 | Candidate | The rsh/rlogin service is running. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/2995 | Proposed (19990804) | ACCEPT(2) Baker, Wall | MODIFY(1) Frech | NOOP(1) Christey | REJECT(1) Northcutt | Christey> aka "shell" on UNIX systems (at least Solaris) in the | /etc/inetd.conf file. | Frech> associated to: | XF:nt-rlogin(92) | XF:rsh-svc(114) | XF:rshd(2995) |
CVE-1999-0652 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL." | null | Modified (20080731) | ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(1) Wall | REJECT(1) Northcutt | Frech> XF:nt-sql-server(1289) | XF:msql-detect(2211) | XF:oracle-detect(2388) | XF:sybase-detect-namedpipes(1461) |
CVE-1999-0653 | Candidate | A component service related to NIS+ is running. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0653 | Proposed (19990804) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0654 | Candidate | The OS/2 or POSIX subsystem in NT is enabled. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0654 | Proposed (19990728) | ACCEPT(1) Wall | MODIFY(1) Frech | NOOP(2) Baker, Christey | REJECT(1) Northcutt | Wall> These subsystems could still allow a process to persist across logins. | Frech> XF:nt-posix(217) | XF:nt-posix-sub-c2(2397) | XF:nt-posix-sub-onceonly(2478) | XF:nt-os2-sub(218) | XF:nt-os2-sub-c2(2396) | XF:nt-os2-sub-onceonly(2477) | XF:nt-os2-registry(2550) | Christey> s2-file-os2(1865) |
CVE-1999-0655 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities." | null | Modified (20080731) | ACCEPT(5) Baker, Frech, Northcutt, Ozancin, Wall | CHANGE> [Frech changed vote from REVIEWING to ACCEPT] |
CVE-1999-0656 | Candidate | The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names. | MISC:http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638 | XF:linux-ugidd(348) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/348 | Modified (20080731) | ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt | null |
CVE-1999-0657 | Candidate | WinGate is being used. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0657 | Proposed (19990804) | ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt | null |
CVE-1999-0658 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running." | null | Modified (20080731) | ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | null |
CVE-1999-0659 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present." | null | Modified (20080731) | REJECT(3) Baker, Northcutt, Wall | Wall> Don't consider this a service or a problem. | Baker> concur with wall on this |
CVE-1999-0660 | Candidate | ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc." | null | Modified (20080730) | ACCEPT(4) Baker, Hill, Northcutt, Wall | NOOP(1) Christey | Christey> Add "back door" to description. |
CVE-1999-0661 | Candidate | A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6. | BID:5921 | URL:http://www.securityfocus.com/bid/5921 | BUGTRAQ:20020801 OpenSSH Security Advisory: Trojaned Distribution Files | URL:http://marc.info/?l=bugtraq&m=102821663814127&w=2 | BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | URL:http://marc.info/?l=bugtraq&m=102820843403741&w=2 | BUGTRAQ:20021009 Re: CERT Advisory CA-2002-28 Trojan Horse Sendmail | URL:http://online.securityfocus.com/archive/1/294539 | CERT:CA-1994-07 | URL:http://www.cert.org/advisories/CA-1994-07.html | CERT:CA-1994-14 | URL:http://www.cert.org/advisories/CA-1994-14.html | CERT:CA-1999-01 | URL:http://www.cert.org/advisories/CA-1999-01.html | CERT:CA-1999-02 | URL:http://www.cert.org/advisories/CA-1999-02.html | CERT:CA-2002-28 | URL:http://www.cert.org/advisories/CA-2002-28.html | XF:sendmail-backdoor(10313) | URL:http://www.iss.net/security_center/static/10313.php | Modified (20050529) | ACCEPT(4) Baker, Hill, Northcutt, Wall | REVIEWING(1) Christey | Christey> Should add the specific CERT advisory references for | well-known Trojaned software. | TCP Wrappers -> CERT:CA-1999-01 | CERT:CA-1999-02 includes util-linux | wuarchive - CERT:CA-94.07 | IRC client - CERT:CA-1994-14 | Christey> BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | Modify description to use dot notation. | Christey> CERT:CA-2002-24 | URL:http://www.cert.org/advisories/CA-2002-24.html | XF:openssh-backdoor(9763) | URL:http://www.iss.net/security_center/static/9763.php | BID:5374 | URL:http://www.securityfocus.com/bid/5374 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Add libpcap and tcpdump: | BUGTRAQ:20021113 Latest libpcap & tcpdump sources from tcpdump.org contain a trojan | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103722456708471&w=2 | CERT:CA-2002-30 | URL:http://www.cert.org/advisories/CA-2002-30.html | | This CAN has been active for over 4 years. At this moment, my | thinking is that we should SPLIT this CAN into each separate | trojaned product, then create some criteria that restrict | creation of new CANs to "widespread" or "important" products only. |
CVE-1999-0662 | Candidate | A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0662 | Proposed (19990804) | ACCEPT(4) Baker, Hill, Northcutt, Wall | null |
CVE-1999-0663 | Candidate | A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0663 | Proposed (19990804) | ACCEPT(3) Baker, Hill, Wall | RECAST(1) Northcutt | Northcutt> This needs to be worded carefully. | 1. Rootkits evade checksum detection. | 2. The modification could be positive (a patch) |
CVE-1999-0664 | Candidate | An application-critical Windows NT registry key has inappropriate permissions. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0664 | Proposed (19990803) | ACCEPT(1) Wall | NOOP(1) Baker | RECAST(2) Christey, Northcutt | Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can't see a way to phrase specific keys in a way that | defines inappropriate. | Christey> Upon further reflection, this is too high-level for CVE. | Specific registry keys with bad permissions is roughly | equivalent to Unix configuration files that have bad | permissions; those permission problems can be created by | any vendor, not just a specific one. Therefore this | candidate should be RECAST into each separate registry | key that has this problem. |
CVE-1999-0665 | Candidate | An application-critical Windows NT registry key has an inappropriate value. | MISC:https://www.cve.org/CVERecord?id=CVE-1999-0665 | Proposed (19990803) | ACCEPT(1) Wall | NOOP(1) Baker | RECAST(1) Northcutt | Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can't see a way to phrase specific keys in a way that | defines inappropriate. | Baker> very vague |
CVE-1999-0667 | Candidate | The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service. | MISC:https://marc.info/?l=bugtraq&m=87602880019797&w=2 | Proposed (19991222) | ACCEPT(2) Blake, Cole | MODIFY(1) Stracener | NOOP(2) Baker, Christey | REJECT(1) Frech | Stracener> Add Ref: BUGTRAQ:19970919 Playing redir games with ARP and ICMP | Frech> Cannot proceed without a reference. Too vague, and resembles XF:netbsd-arp: | CVE-1999-0763: NetBSD on a multi-homed host allows ARP packets on one | network to modify ARP entries on another connected network. | CVE-1999-0764: NetBSD allows ARP packets to overwrite static ARP entries. | Will reconsider if reference provides enough information to render a | distinction. | Christey> This particular vulnerability was exploited by an attacker | during the ID'Net IDS test network exercise at the SANS | Network Security '99 conference. The attacker adapted a | publicly available program that was able to spoof another | machine on the same physical network. | | See http://marc.theaimsgroup.com/?l=bugtraq&m=87602880019797&w=2 | for the Bugtraq reference that Tom Stracener suggested. | This generated a long thread on Bugtraq in 1997. | Blake> I'll second Tom's request to add the reference, it's a very | posting good and the vulnerability is clearly derivative of | the work. | | (I do recall talking to the guy and drafting a description.) |
CVE-1999-0668 | Entry | The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | BID:598 | URL:http://www.securityfocus.com/bid/598 | BUGTRAQ:19990821 IE 5.0 allows executing programs | CIAC:J-064 | URL:http://ciac.llnl.gov/ciac/bulletins/j-064.shtml | MS:MS99-032 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 | MSKB:Q240308 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q240308 | XF:ms-scriptlet-eyedog-unsafe | null | null | null |
CVE-1999-0669 | Candidate | The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | CIAC:J-064 | URL:http://ciac.llnl.gov/ciac/bulletins/j-064.shtml | MS:MS99-032 | MSKB:Q240308 | XF:ms-scriptlet-eyedog-unsafe | Interim (19991229) | ACCEPT(5) Baker, Cole, Ozancin, Prosser, Wall | MODIFY(2) Frech, Stracener | REVIEWING(1) Christey | Frech> XF:ms-scriptlet-eyedog-unsafe | Stracener> Add Ref: MSKB Q240308 | Christey> Should CVE-1999-0669 and 668 be merged? If not, then this is | a reason for not merging CVE-1999-0988 and CVE-1999-0828. |
CVE-1999-0670 | Candidate | Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands. | CIAC:J-064 | URL:http://ciac.llnl.gov/ciac/bulletins/j-064.shtml | MS:MS99-032 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 | Proposed (19991208) | ACCEPT(3) Ozancin, Prosser, Wall | MODIFY(2) Frech, Stracener | REJECT(2) Baker, Cole | Frech> XF:ie-eyedog-bo | Cole> Based on the references and information listed this is the same as | CVE-1999-0669 | Stracener> Add Ref: MSKB Q240308 | Baker> Duplicate |
CVE-1999-0671 | Entry | Buffer overflow in ToxSoft NextFTP client through CWD command. | BID:572 | URL:http://www.securityfocus.com/bid/572 | XF:toxsoft-nextftp-cwd-bo | null | null | null |
CVE-1999-0672 | Entry | Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics. | BID:573 | URL:http://www.securityfocus.com/bid/573 | XF:fujitsu-topic-bo | null | null | null |
CVE-1999-0673 | Candidate | Buffer overflow in ALMail32 POP3 client via From: or To: headers. | BID:574 | URL:http://www.securityfocus.com/bid/574 | Proposed (19991222) | ACCEPT(6) Baker, Blake, Cole, Collins, Levy, Wall | MODIFY(2) Frech, Stracener | NOOP(3) Armstrong, Landfield, Oliver | REVIEWING(1) Ozancin | Stracener> AddRef: ShadowPenguinSecurity:PenguinToolbox,No.037 | Frech> XF:almail-bo | CHANGE> [Cole changed vote from NOOP to ACCEPT] |
CVE-1999-0674 | Entry | The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve. | BID:570 | URL:http://www.securityfocus.com/bid/570 | BUGTRAQ:19990809 profil(2) bug, a simple test program | CIAC:J-067 | URL:http://www.ciac.org/ciac/bulletins/j-067.shtml | FREEBSD:FreeBSD-SA-99:02 | NETBSD:1999-011 | OPENBSD:Aug 9,1999 | XF:netbsd-profil | null | null | null |
CVE-1999-0675 | Entry | Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host. | BID:576 | URL:http://www.securityfocus.com/bid/576 | BUGTRAQ:19990809 FW1 UDP Port 0 DoS | URL:http://www.securityfocus.com/archive/1/23615 | OSVDB:1038 | URL:http://www.osvdb.org/1038 | XF:checkpoint-port | null | null | null |
CVE-1999-0676 | Entry | sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack. | BID:575 | URL:http://www.securityfocus.com/bid/575 | BUGTRAQ:19990808 sdtcm_convert | URL:http://www.securityfocus.com/templates/archive.pike?list=1&[email protected] | XF:sun-sdtcm-convert | null | null | null |
CVE-1999-0677 | Candidate | The WebRamp web administration utility has a default password. | BID:577 | URL:http://www.securityfocus.com/bid/577 | BUGTRAQ:19990802 [LoWNOISE] Password hunting with webramp | Modified (19991228) | ACCEPT(3) Baker, Blake, Stracener | MODIFY(2) Cole, Frech | NOOP(2) Armstrong, Christey | Cole> I would add that is is not forced to be changed. | Frech> XF:webramp-default-password | Christey> This problem may have been detected in January 1999: | BUGTRAQ:19990121 Re: WebRamp M3 remote network access bug | http://marc.theaimsgroup.com/?l=bugtraq&m=91702375402055&w=2 |
CVE-1999-0678 | Entry | A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server. | BID:318 | URL:http://www.securityfocus.com/bid/318 | BUGTRAQ:19990405 An issue with Apache on Debian | XF:apache-debian-usrdoc | null | null | null |
CVE-1999-0679 | Entry | Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option. | BID:581 | URL:http://www.securityfocus.com/bid/581 | BUGTRAQ:19990813 w00w00's efnet ircd advisory (exploit included) | CONFIRM:http://www.efnet.org/archive/servers/hybrid/ChangeLog | XF:hybrid-ircd-minvite-bo | null | null | null |
CVE-1999-0680 | Entry | Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service. | BID:571 | URL:http://www.securityfocus.com/bid/571 | CIAC:J-057 | URL:http://www.ciac.org/ciac/bulletins/j-057.shtml | MS:MS99-028 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-028 | MSKB:Q238600 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q238600 | XF:nt-terminal-dos | null | null | null |
CVE-1999-0681 | Entry | Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL. | BID:568 | URL:http://www.securityfocus.com/bid/568 | BUGTRAQ:19990807 Crash FrontPage Remotely... | URL:http://archives.neohapsis.com/archives/bugtraq/1999-q3/0381.html | XF:frontpage-pws-dos(3117) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/3117 | null | null | null |
CVE-1999-0682 | Entry | Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled. | BID:567 | URL:http://www.securityfocus.com/bid/567 | CIAC:J-056 | URL:http://www.ciac.org/ciac/bulletins/j-056.shtml | MS:MS99-027 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-027 | MSKB:Q237927 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q237927 | XF:exchange-relay | null | null | null |
CVE-1999-0683 | Entry | Denial of service in Gauntlet Firewall via a malformed ICMP packet. | BID:556 | URL:http://www.securityfocus.com/bid/556 | BUGTRAQ:19990729 Remotely Lock Up Gauntlet 5.0 | OSVDB:1029 | URL:http://www.osvdb.org/1029 | XF:gauntlet-dos | null | null | null |
CVE-1999-0684 | Candidate | Denial of service in Sendmail 8.8.6 in HPUX. | HP:HPSBUX9904-097 | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0684 | Proposed (19991214) | ACCEPT(2) Blake, Cole | MODIFY(3) Frech, Prosser, Stracener | NOOP(1) Baker | REJECT(1) Christey | Stracener> Add Ref: CIAC: J-040 | Prosser> Might change description to indicate DoS caused by multiple connections | Christey> Andre's right. This is a duplicate of CVE-1999-0684. | Frech> Without further information and/or references, this issue looks like an | ambiguous version of CVE-1999-0478: Denial of service in HP-UX sendmail | 8.8.6 related to accepting connections. | | (was REJECT) | XF:hp-sendmail-connect-dos |
CVE-1999-0685 | Entry | Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option. | BID:618 | URL:http://www.securityfocus.com/bid/618 | BUGTRAQ:19991209 Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow | null | null | null |
CVE-1999-0686 | Entry | Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL. | BUGTRAQ:19990514 TGAD DoS | BUGTRAQ:19990610 Re: VVOS/Netscape Bug | CIAC:J-046 | URL:http://www.ciac.org/ciac/bulletins/j-046.shtml | HP:HPSBUX9906-098 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-098 | XF:hp-tgad-dos | null | null | null |
CVE-1999-0687 | Entry | The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. | BID:637 | URL:http://www.securityfocus.com/bid/637 | BUGTRAQ:19990913 Vulnerability in ttsession | CERT:CA-99-11 | CIAC:K-001 | URL:http://www.ciac.org/ciac/bulletins/k-001.shtml | COMPAQ:SSRT0617U_TTSESSION | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-ttsession-rpc-auth | null | null | null |
CVE-1999-0688 | Entry | Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x. | BID:545 | URL:http://www.securityfocus.com/bid/545 | HP:HPSBUX9907-101 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-101 | XF:hp-sd-bo | null | null | null |
CVE-1999-0689 | Entry | The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack. | BID:636 | URL:http://www.securityfocus.com/bid/636 | BUGTRAQ:19990913 Vulnerability in dtspcd | CERT:CA-99-11 | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | OVAL:oval:org.mitre.oval:def:1880 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1880 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-dtspcd-file-auth | null | null | null |
CVE-1999-0690 | Entry | HP CDE program includes the current directory in root's PATH variable. | CIAC:J-053 | URL:http://www.ciac.org/ciac/bulletins/j-053.shtml | HP:HPSBUX9907-100 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-100 | XF:hp-cde-directory | null | null | null |
CVE-1999-0691 | Entry | Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. | BID:635 | URL:http://www.securityfocus.com/bid/635 | BUGTRAQ:19990913 Vulnerability in dtaction | CERT:CA-99-11 | COMPAQ:SSRTO615U_DTACTION | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | OVAL:oval:org.mitre.oval:def:3078 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3078 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-dtaction-username-bo | null | null | null |
CVE-1999-0692 | Entry | The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges. | CERT:CA-99-09 | CIAC:J-052 | URL:http://www.ciac.org/ciac/bulletins/j-052.shtml | SGI:19990701-01-P | URL:ftp://patches.sgi.com/support/free/security/advisories/19990701-01-P | XF:sgi-arrayd | null | null | null |
CVE-1999-0693 | Entry | Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges. | BID:641 | URL:http://www.securityfocus.com/bid/641 | CERT:CA-99-11 | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | OVAL:oval:org.mitre.oval:def:4374 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4374 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-dtsession-env-bo | null | null | null |
CVE-1999-0694 | Entry | Denial of service in AIX ptrace system call allows local users to crash the system. | CIAC:J-055 | URL:http://www.ciac.org/ciac/bulletins/j-055.shtml | IBM:ERS-SVA-E01-1999:002.1 | XF:aix-ptrace-halt | null | null | null |
CVE-1999-0695 | Entry | The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack. | BID:620 | URL:http://www.securityfocus.com/bid/620 | BUGTRAQ:19990904 [Sybase] software vendors do not think about old bugs | OSVDB:1064 | URL:http://www.osvdb.org/1064 | XF:http-powerdynamo-dotdotslash | null | null | null |
CVE-1999-0696 | Entry | Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd). | BUGTRAQ:19990709 Exploit of rpc.cmsd | CERT:CA-99-08 | CIAC:J-051 | URL:http://www.ciac.org/ciac/bulletins/j-051.shtml | COMPAQ:SSRT0614U_RPC_CMSD | HP:HPSBUX9908-102 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102 | SCO:SB-99.12 | SUN:00188 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188 | SUNBUG:4230754 | XF:sun-cmsd-bo | null | null | null |
CVE-1999-0697 | Entry | SCO Doctor allows local users to gain root privileges through a Tools option. | BID:621 | URL:http://www.securityfocus.com/bid/621 | BUGTRAQ:19990908 SCO 5.0.5 /bin/doctor nightmare | XF:sco-doctor-execute | null | null | null |
CVE-1999-0698 | Candidate | Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux. | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0698 | Proposed (19991222) | ACCEPT(6) Armstrong, Baker, Blake, Cole, Collins, Ozancin | MODIFY(1) Frech | NOOP(4) Landfield, Levy, Stracener, Wall | REJECT(1) Christey | Stracener> Is the candidate referring to the denial of service problem mentioned in | the | changelogs for versions previous to 1.4.3-1 or does it pertain to some | problem with or | 1.4.8-1? | Frech> Depending on the version, this could be any number of DoSes | related to ippl. | From http://www.larve.net/ippl/: | 9 April 1999: version 1.4.3 released, correctly fixing a | potential denial of service attack. | 7 April 1999: version 1.4.2 released, fixing a potential | denial of service attack. | XF:linux-ippl-dos | Christey> Changelog: http://pltplp.net/ippl/docs/HISTORY | | See comments for version 1.4.2 and 1.4.3 | Another source: http://freshmeat.net/news/1999/04/08/923586598.html | CHANGE> [Stracener changed vote from REVIEWING to NOOP] | CHANGE> [Christey changed vote from NOOP to REJECT] | Christey> As mentioned by others, this could apply to several different | versions. Since the description is too vague, this CAN should | be REJECTED and recast into other candidates. |
CVE-1999-0699 | Entry | The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs. | BID:623 | URL:http://www.securityfocus.com/bid/623 | BUGTRAQ:19990908 [Security] Spoofed Id in Bluestone Sapphire/Web | null | null | null |
CVE-1999-0700 | Entry | Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file. | MS:MS99-026 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-026 | MSKB:Q237185 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q237185 | XF:nt-malformed-dialer | null | null | null |
CVE-1999-0701 | Entry | After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password. | BID:626 | URL:http://www.securityfocus.com/bid/626 | MS:MS99-036 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036 | MSKB:Q173039 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q173039 | XF:nt-install-unattend-file | null | null | null |
CVE-1999-0702 | Entry | Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability. | BID:627 | URL:http://www.securityfocus.com/bid/627 | BUGTRAQ:19990909 IE 5.0 security vulnerabilities - ImportExportFavorites - at least creating and overwriting files, probably executing programs | MS:MS99-037 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037 | MSKB:Q241361 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q241361 | XF:ie5-import-export-favorites | null | null | null |
CVE-1999-0703 | Entry | OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices. | BUGTRAQ:19990805 4.4 BSD issue -- chflags | CIAC:J-066 | URL:http://www.ciac.org/ciac/bulletins/j-066.shtml | FREEBSD:FreeBSD-SA-99:01 | OPENBSD:Jul30,1999 | XF:openbsd-chflags-fchflags-permitted | null | null | null |
CVE-1999-0704 | Entry | Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others. | BID:614 | URL:http://www.securityfocus.com/bid/614 | CALDERA:CSSA-1999:024.0 | CERT:CA-99-12 | DEBIAN:19991018 | FREEBSD:SA-99:06 | REDHAT:RHSA-1999:032-01 | XF:amd-bo | null | null | null |
CVE-1999-0705 | Entry | Buffer overflow in INN inews program. | BID:616 | URL:http://www.securityfocus.com/bid/616 | CALDERA:CSSA-1999-026 | DEBIAN:19990907 | REDHAT:RHSA1999033_01 | SUSE:19990831 Security hole in INN | XF:inn-inews-bo | null | null | null |
CVE-1999-0706 | Entry | Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables. | BID:583 | URL:http://www.securityfocus.com/bid/583 | DEBIAN:19990807 | SUSE:19990817 Security hole in i4l (xmonisdn) | null | null | null |
CVE-1999-0707 | Entry | The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization. | BID:493 | URL:http://www.securityfocus.com/bid/493 | CIAC:J-050 | URL:http://www.ciac.org/ciac/bulletins/j-050.shtml | HP:HPSBUX9906-099 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-099 | XF:hp-visualize-conference-ftp | null | null | null |
CVE-1999-0708 | Entry | Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field. | BID:651 | URL:http://www.securityfocus.com/bid/651 | BUGTRAQ:19990921 BP9909-00: cfingerd local buffer overflow | null | null | null |
CVE-1999-0710 | Entry | The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems. | BID:2059 | URL:http://www.securityfocus.com/bid/2059 | BUGTRAQ:19990725 Redhat 6.0 cachemgr.cgi lameness | CONFIRM:http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid | DEBIAN:DSA-576 | URL:http://www.debian.org/security/2004/dsa-576 | FEDORA:FEDORA-2005-373 | URL:http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html | FEDORA:FLSA-2006:152809 | URL:http://fedoranews.org/updates/FEDORA--.shtml | REDHAT:RHSA-1999:025 | URL:http://www.redhat.com/support/errata/RHSA-1999-025.html | REDHAT:RHSA-2005:489 | URL:http://www.redhat.com/support/errata/RHSA-2005-489.html | XF:http-cgi-cachemgr(2385) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/2385 | null | null | null |
CVE-1999-0711 | Entry | The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root. | BUGTRAQ:19990430 *Huge* security hole in Oracle 8.0.5 with Intellegent agent installed | URL:http://marc.info/?t=92550157100002&w=2&r=1 | BUGTRAQ:19990506 Oracle Security Followup, patch and FAQ: setuid on oratclsh | URL:http://marc.info/?l=bugtraq&m=92609807906778&w=2 | XF:oracle-oratclsh | null | null | null |
CVE-1999-0712 | Candidate | A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable. | CALDERA:CSSA-1999:009 | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0712 | XF:linux-coas | Proposed (19991214) | ACCEPT(4) Baker, Cole, Frech, Stracener | MODIFY(1) Blake | NOOP(1) Armstrong | REVIEWING(1) Christey | Blake> This obscurely-written advisory seems to state that COAS will make the | file world-readable, not that it allows the user to make it so. I hardly | think that allowing the user to turn off security is a vulnerability. | Christey> It's difficult to write the description based on what's in | the advisory. If COAS inadvertently changes permissions | without user confirmation, then it should be ACCEPTed with | appropriate modification to the description. | Christey> ADDREF BID:137 | CHANGE> [Armstrong changed vote from REVIEWING to NOOP] |
CVE-1999-0713 | Entry | The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges. | BUGTRAQ:19990404 Digital Unix 4.0E /var permission | CIAC:J-044 | URL:http://www.ciac.org/ciac/bulletins/j-044.shtml | COMPAQ:SSRT0600U | XF:cde-dtlogin | null | null | null |
CVE-1999-0714 | Entry | Vulnerability in Compaq Tru64 UNIX edauth command. | COMPAQ:SSRT0588U | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0714 | XF:du-edauth | null | null | null |
CVE-1999-0715 | Entry | Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry. | BUGTRAQ:19990519 Buffer Overruns in RAS allows execution of arbitary code as system | MS:MS99-016 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-016 | MSKB:Q230677 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q230677 | XF:nt-ras-bo | null | null | null |
CVE-1999-0716 | Entry | Buffer overflow in Windows NT 4.0 help file utility via a malformed help file. | MS:MS99-015 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-015 | MSKB:Q231605 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q231605 | XF:nt-helpfile-bo | null | null | null |
CVE-1999-0717 | Entry | A remote attacker can disable the virus warning mechanism in Microsoft Excel 97. | MS:MS99-014 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-014 | MSKB:Q231304 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q231304 | XF:excel-virus-warning | null | null | null |
CVE-1999-0718 | Entry | IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key. | BID:608 | URL:http://www.securityfocus.com/bid/608 | NTBUGTRAQ:19990823 IBM Gina security warning | URL:http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9908&L=ntbugtraq&F=&S=&P=5534 | XF:ibm-gina-group-add(3166) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/3166 | null | null | null |
CVE-1999-0719 | Entry | The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code. | BID:563 | URL:http://www.securityfocus.com/bid/563 | BUGTRAQ:19990802 Gnumeric potential security hole. | REDHAT:RHSA-1999:023-01 | XF:gnu-guile-plugin-export | null | null | null |