Name
stringlengths
13
14
Status
stringclasses
2 values
Description
stringlengths
20
2.71k
References
stringlengths
28
30.7k
Phase
stringlengths
18
19
Votes
stringlengths
18
209
Comments
stringlengths
14
8.88k
CVE-1999-0618
Candidate
The rexec service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0618 | XF:rexec
Modified (19990921)
ACCEPT(4) Baker, Northcutt, Ozancin, Wall | MODIFY(1) Frech
Frech> XF:decod-rexec | XF:rexec
CVE-1999-0619
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The Telnet service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0620
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NIS is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt
Christey> XF:ypserv(261)
CVE-1999-0621
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to NETBIOS is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | MODIFY(1) Frech | REJECT(2) LeBlanc, Northcutt
LeBlanc> There is insufficient description to even know what this is. | Lots of component services related to NetBIOS run, and usually do not | constitute a problem. | Frech> associated to: | XF:nt-alerter(29) | XF:nt-messenger(69) | XF:reg-ras-gateway-enabled(2567)
CVE-1999-0622
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A component service related to DNS service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0623
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X Windows service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt
Christey> Add "X11" to facilitate search.
CVE-1999-0624
Candidate
The rstat/rstatd service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0624 | XF:rstat-out | XF:rstatd
Interim (19990925)
ACCEPT(3) Baker, Northcutt, Ozancin | MODIFY(1) Frech | NOOP(2) Meunier, Wall
Frech> XF:rstat-out | XF:rstatd
CVE-1999-0625
Candidate
The rpc.rquotad service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0625
Proposed (19990721)
ACCEPT(3) Baker, Northcutt, Ozancin | MODIFY(1) Frech | NOOP(1) Wall
Frech> XF:rquotad
CVE-1999-0626
Entry
A version of rusers is running that exposes valid user information to any entity on the network.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0626 | XF:ruser | XF:rusersd
null
null
null
CVE-1999-0627
Entry
The rexd service is running, which uses weak authentication that can allow an attacker to execute commands.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0627 | XF:rexd
null
null
null
CVE-1999-0628
Entry
The rwho/rwhod service is running, which exposes machine status and user information.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0628 | XF:rwhod
null
null
null
CVE-1999-0629
Candidate
The ident/identd service is running.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0629
Proposed (19990721)
ACCEPT(2) Baker, Ozancin | MODIFY(1) Frech | NOOP(2) Christey, Wall | REJECT(1) Northcutt
Frech> possibly XF:identd? | Christey> XF:ident-users(318) ? | CHANGE> [Frech changed vote from REVIEWING to MODIFY] | Frech> XF:identd-vuln(61) | XF:ident-users(318)
CVE-1999-0630
Candidate
The NT Alerter and Messenger services are running.
MISC:http://support.microsoft.com/support/kb/articles/q189/2/71.asp
Proposed (19990804)
ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt
Christey> http://support.microsoft.com/support/kb/articles/q189/2/71.asp
CVE-1999-0631
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NFS service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt
Christey> XF:nfs-nfsd(76) ? | Christey> Add rpc.mountd/mountd to facilitate search.
CVE-1999-0632
Candidate
The RPC portmapper service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0632
Proposed (19990804)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0633
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The HTTP/WWW service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0634
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The SSH service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0635
Candidate
The echo service is running.
FULLDISC:20060116 ACT P202S VoIP wireless phone multiple undocumented ports/services | URL:http://lists.grok.org.uk/pipermail/full-disclosure/2006-January/041434.html | SECUNIA:18514 | URL:http://secunia.com/advisories/18514
Modified (20060122)
ACCEPT(3) Baker, Northcutt, Wall | REVIEWING(1) Christey
Northcutt> The method to my madness is echo is the common denom in the dos attack | Christey> How much of this is an overlap with the echo/chargen flood | problem (CVE-1999-0103)? If this is only an exposure because | of CVE-1999-0103, then maybe this should be REJECTed.
CVE-1999-0636
Candidate
The discard service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0636
Proposed (19990804)
ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt
null
CVE-1999-0637
Candidate
The systat service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0637
Proposed (19990804)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0638
Candidate
The daytime service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0638
Proposed (19990804)
ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt
null
CVE-1999-0639
Candidate
The chargen service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0639
Proposed (19990804)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt | REVIEWING(1) Christey
Christey> How much of this is an overlap with the echo/chargen flood | problem (CVE-1999-0103)? If this is only an exposure because | of CVE-1999-0103, then maybe this should be REJECTed.
CVE-1999-0640
Candidate
The Gopher service is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0640
Proposed (19990804)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0641
Candidate
The UUCP service is running.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0641
Proposed (19990804)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0642
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A POP service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0643
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IMAP service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0644
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The NNTP news service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt
Christey> XF:nntp-post(88) ?
CVE-1999-0645
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The IRC service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | NOOP(1) Christey | REJECT(1) Northcutt
Christey> XF:irc-server(767) ?
CVE-1999-0646
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The LDAP service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0647
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The bootparam (bootparamd) service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Ozancin | MODIFY(1) Frech | NOOP(1) Wall | REJECT(1) Northcutt
Frech> XF:bootp
CVE-1999-0648
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The X25 service is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0649
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "The FSP service is running."
null
Modified (20080731)
ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt
null
CVE-1999-0650
Candidate
The netstat service is running, which provides sensitive information to remote attackers.
XF:netstat(72) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/72
Modified (20060608)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0651
Candidate
The rsh/rlogin service is running.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/2995
Proposed (19990804)
ACCEPT(2) Baker, Wall | MODIFY(1) Frech | NOOP(1) Christey | REJECT(1) Northcutt
Christey> aka "shell" on UNIX systems (at least Solaris) in the | /etc/inetd.conf file. | Frech> associated to: | XF:nt-rlogin(92) | XF:rsh-svc(114) | XF:rshd(2995)
CVE-1999-0652
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A database service is running, e.g. a SQL server, Oracle, or mySQL."
null
Modified (20080731)
ACCEPT(1) Baker | MODIFY(1) Frech | NOOP(1) Wall | REJECT(1) Northcutt
Frech> XF:nt-sql-server(1289) | XF:msql-detect(2211) | XF:oracle-detect(2388) | XF:sybase-detect-namedpipes(1461)
CVE-1999-0653
Candidate
A component service related to NIS+ is running.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0653
Proposed (19990804)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0654
Candidate
The OS/2 or POSIX subsystem in NT is enabled.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0654
Proposed (19990728)
ACCEPT(1) Wall | MODIFY(1) Frech | NOOP(2) Baker, Christey | REJECT(1) Northcutt
Wall> These subsystems could still allow a process to persist across logins. | Frech> XF:nt-posix(217) | XF:nt-posix-sub-c2(2397) | XF:nt-posix-sub-onceonly(2478) | XF:nt-os2-sub(218) | XF:nt-os2-sub-c2(2396) | XF:nt-os2-sub-onceonly(2477) | XF:nt-os2-registry(2550) | Christey> s2-file-os2(1865)
CVE-1999-0655
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. Notes: the former description is: "A service may include useful information in its banner or help function (such as the name and version), making it useful for information gathering activities."
null
Modified (20080731)
ACCEPT(5) Baker, Frech, Northcutt, Ozancin, Wall
CHANGE> [Frech changed vote from REVIEWING to ACCEPT]
CVE-1999-0656
Candidate
The ugidd RPC interface, by design, allows remote attackers to enumerate valid usernames by specifying arbitrary UIDs that ugidd maps to local user and group names.
MISC:http://ca.com/au/securityadvisor/vulninfo/Vuln.aspx?ID=1638 | XF:linux-ugidd(348) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/348
Modified (20080731)
ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt
null
CVE-1999-0657
Candidate
WinGate is being used.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0657
Proposed (19990804)
ACCEPT(1) Baker | NOOP(1) Wall | REJECT(1) Northcutt
null
CVE-1999-0658
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "DCOM is running."
null
Modified (20080731)
ACCEPT(2) Baker, Wall | REJECT(1) Northcutt
null
CVE-1999-0659
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is solely about a configuration that does not directly introduce security vulnerabilities, so it is more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A Windows NT Primary Domain Controller (PDC) or Backup Domain Controller (BDC) is present."
null
Modified (20080731)
REJECT(3) Baker, Northcutt, Wall
Wall> Don't consider this a service or a problem. | Baker> concur with wall on this
CVE-1999-0660
Candidate
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: None. Reason: this candidate is not about any specific product, protocol, or design, so it is out of scope of CVE. It might be more appropriate to cover under the Common Configuration Enumeration (CCE). Notes: the former description is: "A hacker utility, back door, or Trojan Horse is installed on a system, e.g. NetBus, Back Orifice, Rootkit, etc."
null
Modified (20080730)
ACCEPT(4) Baker, Hill, Northcutt, Wall | NOOP(1) Christey
Christey> Add "back door" to description.
CVE-1999-0661
Candidate
A system is running a version of software that was replaced with a Trojan Horse at one of its distribution points, such as (1) TCP Wrappers 7.6, (2) util-linux 2.9g, (3) wuarchive ftpd (wuftpd) 2.2 and 2.1f, (4) IRC client (ircII) ircII 2.2.9, (5) OpenSSH 3.4p1, or (6) Sendmail 8.12.6.
BID:5921 | URL:http://www.securityfocus.com/bid/5921 | BUGTRAQ:20020801 OpenSSH Security Advisory: Trojaned Distribution Files | URL:http://marc.info/?l=bugtraq&m=102821663814127&w=2 | BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | URL:http://marc.info/?l=bugtraq&m=102820843403741&w=2 | BUGTRAQ:20021009 Re: CERT Advisory CA-2002-28 Trojan Horse Sendmail | URL:http://online.securityfocus.com/archive/1/294539 | CERT:CA-1994-07 | URL:http://www.cert.org/advisories/CA-1994-07.html | CERT:CA-1994-14 | URL:http://www.cert.org/advisories/CA-1994-14.html | CERT:CA-1999-01 | URL:http://www.cert.org/advisories/CA-1999-01.html | CERT:CA-1999-02 | URL:http://www.cert.org/advisories/CA-1999-02.html | CERT:CA-2002-28 | URL:http://www.cert.org/advisories/CA-2002-28.html | XF:sendmail-backdoor(10313) | URL:http://www.iss.net/security_center/static/10313.php
Modified (20050529)
ACCEPT(4) Baker, Hill, Northcutt, Wall | REVIEWING(1) Christey
Christey> Should add the specific CERT advisory references for | well-known Trojaned software. | TCP Wrappers -> CERT:CA-1999-01 | CERT:CA-1999-02 includes util-linux | wuarchive - CERT:CA-94.07 | IRC client - CERT:CA-1994-14 | Christey> BUGTRAQ:20020801 trojan horse in recent openssh (version 3.4 portable 1) | Modify description to use dot notation. | Christey> CERT:CA-2002-24 | URL:http://www.cert.org/advisories/CA-2002-24.html | XF:openssh-backdoor(9763) | URL:http://www.iss.net/security_center/static/9763.php | BID:5374 | URL:http://www.securityfocus.com/bid/5374 | CHANGE> [Christey changed vote from NOOP to REVIEWING] | Christey> Add libpcap and tcpdump: | BUGTRAQ:20021113 Latest libpcap & tcpdump sources from tcpdump.org contain a trojan | URL:http://marc.theaimsgroup.com/?l=bugtraq&m=103722456708471&w=2 | CERT:CA-2002-30 | URL:http://www.cert.org/advisories/CA-2002-30.html | | This CAN has been active for over 4 years. At this moment, my | thinking is that we should SPLIT this CAN into each separate | trojaned product, then create some criteria that restrict | creation of new CANs to "widespread" or "important" products only.
CVE-1999-0662
Candidate
A system-critical program or library does not have the appropriate patch, hotfix, or service pack installed, or is outdated or obsolete.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0662
Proposed (19990804)
ACCEPT(4) Baker, Hill, Northcutt, Wall
null
CVE-1999-0663
Candidate
A system-critical program, library, or file has a checksum or other integrity measurement that indicates that it has been modified.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0663
Proposed (19990804)
ACCEPT(3) Baker, Hill, Wall | RECAST(1) Northcutt
Northcutt> This needs to be worded carefully. | 1. Rootkits evade checksum detection. | 2. The modification could be positive (a patch)
CVE-1999-0664
Candidate
An application-critical Windows NT registry key has inappropriate permissions.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0664
Proposed (19990803)
ACCEPT(1) Wall | NOOP(1) Baker | RECAST(2) Christey, Northcutt
Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can't see a way to phrase specific keys in a way that | defines inappropriate. | Christey> Upon further reflection, this is too high-level for CVE. | Specific registry keys with bad permissions is roughly | equivalent to Unix configuration files that have bad | permissions; those permission problems can be created by | any vendor, not just a specific one. Therefore this | candidate should be RECAST into each separate registry | key that has this problem.
CVE-1999-0665
Candidate
An application-critical Windows NT registry key has an inappropriate value.
MISC:https://www.cve.org/CVERecord?id=CVE-1999-0665
Proposed (19990803)
ACCEPT(1) Wall | NOOP(1) Baker | RECAST(1) Northcutt
Northcutt> I think we can define appropriate, take a look at the nt security .pdf | and see if you can't see a way to phrase specific keys in a way that | defines inappropriate. | Baker> very vague
CVE-1999-0667
Candidate
The ARP protocol allows any host to spoof ARP replies and poison the ARP cache to conduct IP address spoofing or a denial of service.
MISC:https://marc.info/?l=bugtraq&m=87602880019797&w=2
Proposed (19991222)
ACCEPT(2) Blake, Cole | MODIFY(1) Stracener | NOOP(2) Baker, Christey | REJECT(1) Frech
Stracener> Add Ref: BUGTRAQ:19970919 Playing redir games with ARP and ICMP | Frech> Cannot proceed without a reference. Too vague, and resembles XF:netbsd-arp: | CVE-1999-0763: NetBSD on a multi-homed host allows ARP packets on one | network to modify ARP entries on another connected network. | CVE-1999-0764: NetBSD allows ARP packets to overwrite static ARP entries. | Will reconsider if reference provides enough information to render a | distinction. | Christey> This particular vulnerability was exploited by an attacker | during the ID'Net IDS test network exercise at the SANS | Network Security '99 conference. The attacker adapted a | publicly available program that was able to spoof another | machine on the same physical network. | | See http://marc.theaimsgroup.com/?l=bugtraq&m=87602880019797&w=2 | for the Bugtraq reference that Tom Stracener suggested. | This generated a long thread on Bugtraq in 1997. | Blake> I'll second Tom's request to add the reference, it's a very | posting good and the vulnerability is clearly derivative of | the work. | | (I do recall talking to the guy and drafting a description.)
CVE-1999-0668
Entry
The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
BID:598 | URL:http://www.securityfocus.com/bid/598 | BUGTRAQ:19990821 IE 5.0 allows executing programs | CIAC:J-064 | URL:http://ciac.llnl.gov/ciac/bulletins/j-064.shtml | MS:MS99-032 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032 | MSKB:Q240308 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q240308 | XF:ms-scriptlet-eyedog-unsafe
null
null
null
CVE-1999-0669
Candidate
The Eyedog ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy.
CIAC:J-064 | URL:http://ciac.llnl.gov/ciac/bulletins/j-064.shtml | MS:MS99-032 | MSKB:Q240308 | XF:ms-scriptlet-eyedog-unsafe
Interim (19991229)
ACCEPT(5) Baker, Cole, Ozancin, Prosser, Wall | MODIFY(2) Frech, Stracener | REVIEWING(1) Christey
Frech> XF:ms-scriptlet-eyedog-unsafe | Stracener> Add Ref: MSKB Q240308 | Christey> Should CVE-1999-0669 and 668 be merged? If not, then this is | a reason for not merging CVE-1999-0988 and CVE-1999-0828.
CVE-1999-0670
Candidate
Buffer overflow in the Eyedog ActiveX control allows a remote attacker to execute arbitrary commands.
CIAC:J-064 | URL:http://ciac.llnl.gov/ciac/bulletins/j-064.shtml | MS:MS99-032 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-032
Proposed (19991208)
ACCEPT(3) Ozancin, Prosser, Wall | MODIFY(2) Frech, Stracener | REJECT(2) Baker, Cole
Frech> XF:ie-eyedog-bo | Cole> Based on the references and information listed this is the same as | CVE-1999-0669 | Stracener> Add Ref: MSKB Q240308 | Baker> Duplicate
CVE-1999-0671
Entry
Buffer overflow in ToxSoft NextFTP client through CWD command.
BID:572 | URL:http://www.securityfocus.com/bid/572 | XF:toxsoft-nextftp-cwd-bo
null
null
null
CVE-1999-0672
Entry
Buffer overflow in Fujitsu Chocoa IRC client via IRC channel topics.
BID:573 | URL:http://www.securityfocus.com/bid/573 | XF:fujitsu-topic-bo
null
null
null
CVE-1999-0673
Candidate
Buffer overflow in ALMail32 POP3 client via From: or To: headers.
BID:574 | URL:http://www.securityfocus.com/bid/574
Proposed (19991222)
ACCEPT(6) Baker, Blake, Cole, Collins, Levy, Wall | MODIFY(2) Frech, Stracener | NOOP(3) Armstrong, Landfield, Oliver | REVIEWING(1) Ozancin
Stracener> AddRef: ShadowPenguinSecurity:PenguinToolbox,No.037 | Frech> XF:almail-bo | CHANGE> [Cole changed vote from NOOP to ACCEPT]
CVE-1999-0674
Entry
The BSD profil system call allows a local user to modify the internal data space of a program via profiling and execve.
BID:570 | URL:http://www.securityfocus.com/bid/570 | BUGTRAQ:19990809 profil(2) bug, a simple test program | CIAC:J-067 | URL:http://www.ciac.org/ciac/bulletins/j-067.shtml | FREEBSD:FreeBSD-SA-99:02 | NETBSD:1999-011 | OPENBSD:Aug 9,1999 | XF:netbsd-profil
null
null
null
CVE-1999-0675
Entry
Check Point FireWall-1 can be subjected to a denial of service via UDP packets that are sent through VPN-1 to port 0 of a host.
BID:576 | URL:http://www.securityfocus.com/bid/576 | BUGTRAQ:19990809 FW1 UDP Port 0 DoS | URL:http://www.securityfocus.com/archive/1/23615 | OSVDB:1038 | URL:http://www.osvdb.org/1038 | XF:checkpoint-port
null
null
null
CVE-1999-0676
Entry
sdtcm_convert in Solaris 2.6 allows a local user to overwrite sensitive files via a symlink attack.
BID:575 | URL:http://www.securityfocus.com/bid/575 | BUGTRAQ:19990808 sdtcm_convert | URL:http://www.securityfocus.com/templates/archive.pike?list=1&[email protected] | XF:sun-sdtcm-convert
null
null
null
CVE-1999-0677
Candidate
The WebRamp web administration utility has a default password.
BID:577 | URL:http://www.securityfocus.com/bid/577 | BUGTRAQ:19990802 [LoWNOISE] Password hunting with webramp
Modified (19991228)
ACCEPT(3) Baker, Blake, Stracener | MODIFY(2) Cole, Frech | NOOP(2) Armstrong, Christey
Cole> I would add that is is not forced to be changed. | Frech> XF:webramp-default-password | Christey> This problem may have been detected in January 1999: | BUGTRAQ:19990121 Re: WebRamp M3 remote network access bug | http://marc.theaimsgroup.com/?l=bugtraq&m=91702375402055&w=2
CVE-1999-0678
Entry
A default configuration of Apache on Debian GNU/Linux sets the ServerRoot to /usr/doc, which allows remote users to read documentation files for the entire server.
BID:318 | URL:http://www.securityfocus.com/bid/318 | BUGTRAQ:19990405 An issue with Apache on Debian | XF:apache-debian-usrdoc
null
null
null
CVE-1999-0679
Entry
Buffer overflow in hybrid-6 IRC server commonly used on EFnet allows remote attackers to execute commands via m_invite invite option.
BID:581 | URL:http://www.securityfocus.com/bid/581 | BUGTRAQ:19990813 w00w00's efnet ircd advisory (exploit included) | CONFIRM:http://www.efnet.org/archive/servers/hybrid/ChangeLog | XF:hybrid-ircd-minvite-bo
null
null
null
CVE-1999-0680
Entry
Windows NT Terminal Server performs extra work when a client opens a new connection but before it is authenticated, allowing for a denial of service.
BID:571 | URL:http://www.securityfocus.com/bid/571 | CIAC:J-057 | URL:http://www.ciac.org/ciac/bulletins/j-057.shtml | MS:MS99-028 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-028 | MSKB:Q238600 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q238600 | XF:nt-terminal-dos
null
null
null
CVE-1999-0681
Entry
Buffer overflow in Microsoft FrontPage Server Extensions (PWS) 3.0.2.926 on Windows 95, and possibly other versions, allows remote attackers to cause a denial of service via a long URL.
BID:568 | URL:http://www.securityfocus.com/bid/568 | BUGTRAQ:19990807 Crash FrontPage Remotely... | URL:http://archives.neohapsis.com/archives/bugtraq/1999-q3/0381.html | XF:frontpage-pws-dos(3117) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/3117
null
null
null
CVE-1999-0682
Entry
Microsoft Exchange 5.5 allows a remote attacker to relay email (i.e. spam) using encapsulated SMTP addresses, even if the anti-relaying features are enabled.
BID:567 | URL:http://www.securityfocus.com/bid/567 | CIAC:J-056 | URL:http://www.ciac.org/ciac/bulletins/j-056.shtml | MS:MS99-027 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-027 | MSKB:Q237927 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q237927 | XF:exchange-relay
null
null
null
CVE-1999-0683
Entry
Denial of service in Gauntlet Firewall via a malformed ICMP packet.
BID:556 | URL:http://www.securityfocus.com/bid/556 | BUGTRAQ:19990729 Remotely Lock Up Gauntlet 5.0 | OSVDB:1029 | URL:http://www.osvdb.org/1029 | XF:gauntlet-dos
null
null
null
CVE-1999-0684
Candidate
Denial of service in Sendmail 8.8.6 in HPUX.
HP:HPSBUX9904-097 | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0684
Proposed (19991214)
ACCEPT(2) Blake, Cole | MODIFY(3) Frech, Prosser, Stracener | NOOP(1) Baker | REJECT(1) Christey
Stracener> Add Ref: CIAC: J-040 | Prosser> Might change description to indicate DoS caused by multiple connections | Christey> Andre's right. This is a duplicate of CVE-1999-0684. | Frech> Without further information and/or references, this issue looks like an | ambiguous version of CVE-1999-0478: Denial of service in HP-UX sendmail | 8.8.6 related to accepting connections. | | (was REJECT) | XF:hp-sendmail-connect-dos
CVE-1999-0685
Entry
Buffer overflow in Netscape Communicator via EMBED tags in the pluginspage option.
BID:618 | URL:http://www.securityfocus.com/bid/618 | BUGTRAQ:19991209 Netscape communicator 4.06J, 4.5J-4.6J, 4.61e Buffer Overflow
null
null
null
CVE-1999-0686
Entry
Denial of service in Netscape Enterprise Server (NES) in HP Virtual Vault (VVOS) via a long URL.
BUGTRAQ:19990514 TGAD DoS | BUGTRAQ:19990610 Re: VVOS/Netscape Bug | CIAC:J-046 | URL:http://www.ciac.org/ciac/bulletins/j-046.shtml | HP:HPSBUX9906-098 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-098 | XF:hp-tgad-dos
null
null
null
CVE-1999-0687
Entry
The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands.
BID:637 | URL:http://www.securityfocus.com/bid/637 | BUGTRAQ:19990913 Vulnerability in ttsession | CERT:CA-99-11 | CIAC:K-001 | URL:http://www.ciac.org/ciac/bulletins/k-001.shtml | COMPAQ:SSRT0617U_TTSESSION | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-ttsession-rpc-auth
null
null
null
CVE-1999-0688
Entry
Buffer overflows in HP Software Distributor (SD) for HPUX 10.x and 11.x.
BID:545 | URL:http://www.securityfocus.com/bid/545 | HP:HPSBUX9907-101 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-101 | XF:hp-sd-bo
null
null
null
CVE-1999-0689
Entry
The CDE dtspcd daemon allows local users to execute arbitrary commands via a symlink attack.
BID:636 | URL:http://www.securityfocus.com/bid/636 | BUGTRAQ:19990913 Vulnerability in dtspcd | CERT:CA-99-11 | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | OVAL:oval:org.mitre.oval:def:1880 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1880 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-dtspcd-file-auth
null
null
null
CVE-1999-0690
Entry
HP CDE program includes the current directory in root's PATH variable.
CIAC:J-053 | URL:http://www.ciac.org/ciac/bulletins/j-053.shtml | HP:HPSBUX9907-100 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9907-100 | XF:hp-cde-directory
null
null
null
CVE-1999-0691
Entry
Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name.
BID:635 | URL:http://www.securityfocus.com/bid/635 | BUGTRAQ:19990913 Vulnerability in dtaction | CERT:CA-99-11 | COMPAQ:SSRTO615U_DTACTION | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | OVAL:oval:org.mitre.oval:def:3078 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3078 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-dtaction-username-bo
null
null
null
CVE-1999-0692
Entry
The default configuration of the Array Services daemon (arrayd) disables authentication, allowing remote users to gain root privileges.
CERT:CA-99-09 | CIAC:J-052 | URL:http://www.ciac.org/ciac/bulletins/j-052.shtml | SGI:19990701-01-P | URL:ftp://patches.sgi.com/support/free/security/advisories/19990701-01-P | XF:sgi-arrayd
null
null
null
CVE-1999-0693
Entry
Buffer overflow in TT_SESSION environment variable in ToolTalk shared library allows local users to gain root privileges.
BID:641 | URL:http://www.securityfocus.com/bid/641 | CERT:CA-99-11 | HP:HPSBUX9909-103 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9909-103 | OVAL:oval:org.mitre.oval:def:4374 | URL:https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A4374 | SUN:00192 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/192 | XF:cde-dtsession-env-bo
null
null
null
CVE-1999-0694
Entry
Denial of service in AIX ptrace system call allows local users to crash the system.
CIAC:J-055 | URL:http://www.ciac.org/ciac/bulletins/j-055.shtml | IBM:ERS-SVA-E01-1999:002.1 | XF:aix-ptrace-halt
null
null
null
CVE-1999-0695
Entry
The Sybase PowerDynamo personal web server allows attackers to read arbitrary files through a .. (dot dot) attack.
BID:620 | URL:http://www.securityfocus.com/bid/620 | BUGTRAQ:19990904 [Sybase] software vendors do not think about old bugs | OSVDB:1064 | URL:http://www.osvdb.org/1064 | XF:http-powerdynamo-dotdotslash
null
null
null
CVE-1999-0696
Entry
Buffer overflow in CDE Calendar Manager Service Daemon (rpc.cmsd).
BUGTRAQ:19990709 Exploit of rpc.cmsd | CERT:CA-99-08 | CIAC:J-051 | URL:http://www.ciac.org/ciac/bulletins/j-051.shtml | COMPAQ:SSRT0614U_RPC_CMSD | HP:HPSBUX9908-102 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9908-102 | SCO:SB-99.12 | SUN:00188 | URL:http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/188 | SUNBUG:4230754 | XF:sun-cmsd-bo
null
null
null
CVE-1999-0697
Entry
SCO Doctor allows local users to gain root privileges through a Tools option.
BID:621 | URL:http://www.securityfocus.com/bid/621 | BUGTRAQ:19990908 SCO 5.0.5 /bin/doctor nightmare | XF:sco-doctor-execute
null
null
null
CVE-1999-0698
Candidate
Denial of service in IP protocol logger (ippl) on Red Hat and Debian Linux.
MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0698
Proposed (19991222)
ACCEPT(6) Armstrong, Baker, Blake, Cole, Collins, Ozancin | MODIFY(1) Frech | NOOP(4) Landfield, Levy, Stracener, Wall | REJECT(1) Christey
Stracener> Is the candidate referring to the denial of service problem mentioned in | the | changelogs for versions previous to 1.4.3-1 or does it pertain to some | problem with or | 1.4.8-1? | Frech> Depending on the version, this could be any number of DoSes | related to ippl. | From http://www.larve.net/ippl/: | 9 April 1999: version 1.4.3 released, correctly fixing a | potential denial of service attack. | 7 April 1999: version 1.4.2 released, fixing a potential | denial of service attack. | XF:linux-ippl-dos | Christey> Changelog: http://pltplp.net/ippl/docs/HISTORY | | See comments for version 1.4.2 and 1.4.3 | Another source: http://freshmeat.net/news/1999/04/08/923586598.html | CHANGE> [Stracener changed vote from REVIEWING to NOOP] | CHANGE> [Christey changed vote from NOOP to REJECT] | Christey> As mentioned by others, this could apply to several different | versions. Since the description is too vague, this CAN should | be REJECTED and recast into other candidates.
CVE-1999-0699
Entry
The Bluestone Sapphire web server allows session hijacking via easily guessable session IDs.
BID:623 | URL:http://www.securityfocus.com/bid/623 | BUGTRAQ:19990908 [Security] Spoofed Id in Bluestone Sapphire/Web
null
null
null
CVE-1999-0700
Entry
Buffer overflow in Microsoft Phone Dialer (dialer.exe), via a malformed dialer entry in the dialer.ini file.
MS:MS99-026 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-026 | MSKB:Q237185 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q237185 | XF:nt-malformed-dialer
null
null
null
CVE-1999-0701
Entry
After an unattended installation of Windows NT 4.0, an installation file could include sensitive information such as the local Administrator password.
BID:626 | URL:http://www.securityfocus.com/bid/626 | MS:MS99-036 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-036 | MSKB:Q173039 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q173039 | XF:nt-install-unattend-file
null
null
null
CVE-1999-0702
Entry
Internet Explorer 5.0 and 5.01 allows remote attackers to modify or execute files via the Import/Export Favorites feature, aka the "ImportExportFavorites" vulnerability.
BID:627 | URL:http://www.securityfocus.com/bid/627 | BUGTRAQ:19990909 IE 5.0 security vulnerabilities - ImportExportFavorites - at least creating and overwriting files, probably executing programs | MS:MS99-037 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037 | MSKB:Q241361 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q241361 | XF:ie5-import-export-favorites
null
null
null
CVE-1999-0703
Entry
OpenBSD, BSDI, and other Unix operating systems allow users to set chflags and fchflags on character and block devices.
BUGTRAQ:19990805 4.4 BSD issue -- chflags | CIAC:J-066 | URL:http://www.ciac.org/ciac/bulletins/j-066.shtml | FREEBSD:FreeBSD-SA-99:01 | OPENBSD:Jul30,1999 | XF:openbsd-chflags-fchflags-permitted
null
null
null
CVE-1999-0704
Entry
Buffer overflow in Berkeley automounter daemon (amd) logging facility provided in the Linux am-utils package and others.
BID:614 | URL:http://www.securityfocus.com/bid/614 | CALDERA:CSSA-1999:024.0 | CERT:CA-99-12 | DEBIAN:19991018 | FREEBSD:SA-99:06 | REDHAT:RHSA-1999:032-01 | XF:amd-bo
null
null
null
CVE-1999-0705
Entry
Buffer overflow in INN inews program.
BID:616 | URL:http://www.securityfocus.com/bid/616 | CALDERA:CSSA-1999-026 | DEBIAN:19990907 | REDHAT:RHSA1999033_01 | SUSE:19990831 Security hole in INN | XF:inn-inews-bo
null
null
null
CVE-1999-0706
Entry
Linux xmonisdn package allows local users to gain root privileges by modifying the IFS or PATH environmental variables.
BID:583 | URL:http://www.securityfocus.com/bid/583 | DEBIAN:19990807 | SUSE:19990817 Security hole in i4l (xmonisdn)
null
null
null
CVE-1999-0707
Entry
The default FTP configuration in HP Visualize Conference allows conference users to send a file to other participants without authorization.
BID:493 | URL:http://www.securityfocus.com/bid/493 | CIAC:J-050 | URL:http://www.ciac.org/ciac/bulletins/j-050.shtml | HP:HPSBUX9906-099 | URL:http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9906-099 | XF:hp-visualize-conference-ftp
null
null
null
CVE-1999-0708
Entry
Buffer overflow in cfingerd allows local users to gain root privileges via a long GECOS field.
BID:651 | URL:http://www.securityfocus.com/bid/651 | BUGTRAQ:19990921 BP9909-00: cfingerd local buffer overflow
null
null
null
CVE-1999-0710
Entry
The Squid package in Red Hat Linux 5.2 and 6.0, and other distributions, installs cachemgr.cgi in a public web directory, which allows remote attackers to use it as an intermediary to connect to other systems.
BID:2059 | URL:http://www.securityfocus.com/bid/2059 | BUGTRAQ:19990725 Redhat 6.0 cachemgr.cgi lameness | CONFIRM:http://www.redhat.com/support/errata/archives/rh52-errata-general.html#squid | DEBIAN:DSA-576 | URL:http://www.debian.org/security/2004/dsa-576 | FEDORA:FEDORA-2005-373 | URL:http://www.redhat.com/archives/fedora-announce-list/2005-May/msg00025.html | FEDORA:FLSA-2006:152809 | URL:http://fedoranews.org/updates/FEDORA--.shtml | REDHAT:RHSA-1999:025 | URL:http://www.redhat.com/support/errata/RHSA-1999-025.html | REDHAT:RHSA-2005:489 | URL:http://www.redhat.com/support/errata/RHSA-2005-489.html | XF:http-cgi-cachemgr(2385) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/2385
null
null
null
CVE-1999-0711
Entry
The oratclsh interpreter in Oracle 8.x Intelligent Agent for Unix allows local users to execute Tcl commands as root.
BUGTRAQ:19990430 *Huge* security hole in Oracle 8.0.5 with Intellegent agent installed | URL:http://marc.info/?t=92550157100002&w=2&r=1 | BUGTRAQ:19990506 Oracle Security Followup, patch and FAQ: setuid on oratclsh | URL:http://marc.info/?l=bugtraq&m=92609807906778&w=2 | XF:oracle-oratclsh
null
null
null
CVE-1999-0712
Candidate
A vulnerability in Caldera Open Administration System (COAS) allows the /etc/shadow password file to be made world-readable.
CALDERA:CSSA-1999:009 | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0712 | XF:linux-coas
Proposed (19991214)
ACCEPT(4) Baker, Cole, Frech, Stracener | MODIFY(1) Blake | NOOP(1) Armstrong | REVIEWING(1) Christey
Blake> This obscurely-written advisory seems to state that COAS will make the | file world-readable, not that it allows the user to make it so. I hardly | think that allowing the user to turn off security is a vulnerability. | Christey> It's difficult to write the description based on what's in | the advisory. If COAS inadvertently changes permissions | without user confirmation, then it should be ACCEPTed with | appropriate modification to the description. | Christey> ADDREF BID:137 | CHANGE> [Armstrong changed vote from REVIEWING to NOOP]
CVE-1999-0713
Entry
The dtlogin program in Compaq Tru64 UNIX allows local users to gain root privileges.
BUGTRAQ:19990404 Digital Unix 4.0E /var permission | CIAC:J-044 | URL:http://www.ciac.org/ciac/bulletins/j-044.shtml | COMPAQ:SSRT0600U | XF:cde-dtlogin
null
null
null
CVE-1999-0714
Entry
Vulnerability in Compaq Tru64 UNIX edauth command.
COMPAQ:SSRT0588U | MISC:https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0714 | XF:du-edauth
null
null
null
CVE-1999-0715
Entry
Buffer overflow in Remote Access Service (RAS) client allows an attacker to execute commands or cause a denial of service via a malformed phonebook entry.
BUGTRAQ:19990519 Buffer Overruns in RAS allows execution of arbitary code as system | MS:MS99-016 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-016 | MSKB:Q230677 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q230677 | XF:nt-ras-bo
null
null
null
CVE-1999-0716
Entry
Buffer overflow in Windows NT 4.0 help file utility via a malformed help file.
MS:MS99-015 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-015 | MSKB:Q231605 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q231605 | XF:nt-helpfile-bo
null
null
null
CVE-1999-0717
Entry
A remote attacker can disable the virus warning mechanism in Microsoft Excel 97.
MS:MS99-014 | URL:https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-014 | MSKB:Q231304 | URL:http://support.microsoft.com/default.aspx?scid=kb;[LN];Q231304 | XF:excel-virus-warning
null
null
null
CVE-1999-0718
Entry
IBM GINA, when used for OS/2 domain authentication of Windows NT users, allows local users to gain administrator privileges by changing the GroupMapping registry key.
BID:608 | URL:http://www.securityfocus.com/bid/608 | NTBUGTRAQ:19990823 IBM Gina security warning | URL:http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind9908&L=ntbugtraq&F=&S=&P=5534 | XF:ibm-gina-group-add(3166) | URL:https://exchange.xforce.ibmcloud.com/vulnerabilities/3166
null
null
null
CVE-1999-0719
Entry
The Guile plugin for the Gnumeric spreadsheet package allows attackers to execute arbitrary code.
BID:563 | URL:http://www.securityfocus.com/bid/563 | BUGTRAQ:19990802 Gnumeric potential security hole. | REDHAT:RHSA-1999:023-01 | XF:gnu-guile-plugin-export
null
null
null