Dataset Viewer
id
string | title
string | description
string | cpes
sequence | cvss_v4_0
null | cvss_v3_1
float64 | cvss_v3_0
null | cvss_v2_0
float64 |
---|---|---|---|---|---|---|---|
CVE-1999-0028 | root privileges via buffer overflow in login/scheme command on SGI IRIX systems. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0165 | NFS cache poisoning. | [
"cpe:2.3:a:sun:nfs:*:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0013 | Stolen credentials from SSH clients via ssh-agent program, allowing other local users to access remote accounts belonging to the ssh-agent user. | [
"cpe:2.3:a:ssh:ssh:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.4:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.5:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.7:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.8:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.9:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.10:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.12:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.13:*:*:*:*:*:*:*",
"cpe:2.3:a:ssh:ssh:1.2.14:*:*:*:*:*:*:*"
] | null | 8.4 | null | 7.5 |
|
CVE-1999-0182 | Samba has a buffer overflow which allows a remote attacker to obtain root access by specifying a long password. | [
"cpe:2.3:a:samba:samba:*:p2:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0191 | IIS newdsn.exe CGI script allows remote users to overwrite files. | [
"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-1999-0047 | MIME conversion buffer overflow in sendmail versions 8.8.3 and 8.8.4. | [
"cpe:2.3:a:eric_allman:sendmail:8.8.3:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.8.4:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0125 | Buffer overflow in SGI IRIX mailx program. | [
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-1999-0042 | Buffer overflow in University of Washington's implementation of IMAP and POP servers. | [
"cpe:2.3:a:university_of_washington:imap:4:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_washington:pop:3:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0196 | websendmail in Webgais 1.0 allows a remote user to access arbitrary files and execute arbitrary code via the receiver parameter ($VAR_receiver variable). | [
"cpe:2.3:a:webgais_development_team:webgais:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0001 | ip_input.c in BSD-derived TCP/IP implementations allows remote attackers to cause a denial of service (crash or hang) via crafted packets. | [
"cpe:2.3:o:bsdi:bsd_os:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.7.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.2.8:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*",
"cpe:2.3:o:openbsd:openbsd:2.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0128 | Oversized ICMP ping packets can result in a denial of service, aka Ping o' Death. | [
"cpe:2.3:o:digital:osf_1:1.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:1.3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:tcp_ip:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:h:ibm:sng:*:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:sng:2.1:*:*:*:*:*:*:*",
"cpe:2.3:h:ibm:sng:2.2:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0179 | Windows NT crashes or locks up when a Samba client executes a "cd .." command on a file share. | [
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:3.5.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0115 | AIX bugfiler program allows local users to gain root access. | [
"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0156 | wu-ftpd FTP daemon allows any user and password combination. | [
"cpe:2.3:a:washington_university:wu-ftpd:*:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-1999-0142 | The Java Applet Security Manager implementation in Netscape Navigator 2.0 and Java Developer's Kit 1.0 allows an applet to connect to arbitrary hosts. | [
"cpe:2.3:a:netscape:navigator:*:*:*:*:*:*:*:*",
"cpe:2.3:a:sun:java:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0082 | CWD ~root command in ftpd allows root access. | [
"cpe:2.3:a:ftp:ftp:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ftpcd:ftpcd:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0014 | Unauthorized privileged access or denial of service via dtappgather program in CDE. | [
"cpe:2.3:a:cde:cde:1.01:*:*:*:*:*:*:*",
"cpe:2.3:a:cde:cde:1.01_x86:*:*:*:*:*:*:*",
"cpe:2.3:a:cde:cde:1.02:*:*:*:*:*:*:*",
"cpe:2.3:a:cde:cde:1.2:*:*:*:*:*:*:*",
"cpe:2.3:a:cde:cde:1.02_x86:*:*:*:*:*:*:*",
"cpe:2.3:a:cde:cde:1.2_x86:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:vvos:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0091 | Buffer overflow in AIX writesrv command allows local users to obtain root access. | [
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0045 | List of arbitrary files on Web host via nph-test-cgi script. | [
"cpe:2.3:a:apache:http_server:0.8.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:0.8.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:http_server:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:commerce_server:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communications_server:1.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communications_server:1.12:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:2.0a:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0140 | Denial of service in RAS/PPTP on NT systems. | [
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-34473 | An issue was discovered in appmgr in O-RAN Near-RT RIC I-Release. An attacker could register an unintended RMR message type during xApp registration to disrupt other service components. | [
"cpe:2.3:o:o-ran-sc:near-rt_ric:i-release:*:*:*:*:*:*:*"
] | null | 5.3 | null | null |
|
CVE-1999-0170 | Remote attackers can mount an NFS file system in Ultrix or OSF, even if it is denied on the access list. | [
"cpe:2.3:o:digital:ultrix:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0136 | Kodak Color Management System (KCMS) on Solaris allows a local user to write to arbitrary files and gain root access. | [
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0171 | Denial of service in syslog by sending it a large number of superfluous messages. | [
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-1999-0072 | Buffer overflow in AIX xdat gives root access to local users. | [
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0189 | Solaris rpcbind listens on a high numbered UDP port, which may not be filtered since the standard port number is 111. | [
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0008 | Buffer overflow in NIS+, in Sun's rpc.nisd program. | [
"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0192 | Buffer overflow in telnet daemon tgetent routing allows remote attackers to gain root access via the TERMCAP environmental variable. | [
"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:5.2:*:i386:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:6.0:*:i386:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.4:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.5:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.6:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.9:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:4.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0129 | Sendmail allows local users to write to a file and gain group permissions via a .forward or :include: file. | [
"cpe:2.3:a:eric_allman:sendmail:8.8:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.8.2:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.8.3:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.6:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:internet_faststart:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-1999-0190 | Solaris rpcbind can be exploited to overwrite arbitrary files and gain root access. | [
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0098 | Buffer overflow in SMTP HELO command in Sendmail allows a remote attacker to hide activities. | [
"cpe:2.3:a:apple:appleshare:-:*:*:ja:*:*:*:*",
"cpe:2.3:a:pmail:mercury_mail_server:-:*:*:*:*:*:*:*",
"cpe:2.3:a:seattlelab:slmail:2.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0055 | Buffer overflows in Sun libnsl allow root access. | [
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0120 | Sun/Solaris utmp file allows local users to gain root access if it is writable by users other than root. | [
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0181 | The wall daemon can be used for denial of service, social engineering attacks, or to execute remote commands. | [
"cpe:2.3:a:rpc.walld:rpc.walld:*:*:*:*:*:*:*:*"
] | null | null | null | 6.8 |
|
CVE-1999-0106 | Finger redirection allows finger bombs. | [] | null | null | null | 2.1 |
|
CVE-1999-0024 | DNS cache poisoning via BIND, by predictable query IDs. | [
"cpe:2.3:a:isc:bind:4.9.5:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-37000 | Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software | A maliciously crafted X_B file, when parsed in pskernel.DLL through Autodesk applications, can lead to a memory corruption vulnerability by write access violation. This vulnerability, in conjunction with other vulnerabilities, can lead to code execution in the context of the current process. | [
"cpe:2.3:a:autodesk:autocad:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:advance_steel:2024:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:2024:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-1999-0084 | Certain NFS servers allow users to use mknod to gain privileges by creating a writable kmem device and setting the UID to 0. | [
"cpe:2.3:a:sun:nfs:*:*:*:*:*:*:*:*"
] | null | 8.4 | null | 7.2 |
|
CVE-1999-0139 | Buffer overflow in Solaris x86 mkcookie allows local users to obtain root access. | [
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0040 | Buffer overflow in Xt library of X Windowing System allows local users to execute commands with root privileges. | [
"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.1.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:ews-ux_v:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:ews-ux_v:4.2mp:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:up-ux_v:4.2mp:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0119 | Windows NT 4.0 beta allows users to read and delete shares. | [
"cpe:2.3:o:microsoft:windows_nt:4.0:*:beta:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0073 | Telnet allows a remote client to specify environment variables including LD_LIBRARY_PATH, allowing an attacker to bypass the normal system libraries and gain root access. | [
"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:osf_1:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:osf_1:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:osf_1:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:osf_1:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:osf_1:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:3.2g:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:unix:4.0:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0114 | Local users can execute commands as other users, and read other users' files, through the filter command in the Elm elm-2.4 mail package using a symlink attack. | [
"cpe:2.3:a:elm_development_group:elm:2.4:*:*:*:*:*:*:*"
] | null | null | null | 4.6 |
|
CVE-1999-0062 | The chpass command in OpenBSD allows a local user to gain root access through file descriptor leakage. | [
"cpe:2.3:o:openbsd:openbsd:2.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0175 | The convert.bas program in the Novell web server allows a remote attackers to read any file on the system that is internally accessible by the web server. | [
"cpe:2.3:a:novell:web_server:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0041 | Buffer overflow in NLS (Natural Language Service). | [
"cpe:2.3:a:gnu:libc:5.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libc:5.2.18:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:libc:5.3.12:*:*:*:*:*:*:*",
"cpe:2.3:o:cray:unicos:1.5:*:mk:*:*:*:*:*",
"cpe:2.3:o:cray:unicos:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cray:unicos:9.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cray:unicos_max:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:slackware:slackware_linux:3.1:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0060 | Attackers can cause a denial of service in Ascend MAX and Pipeline routers with a malformed packet to the discard port, which is used by the Java Configurator tool. | [
"cpe:2.3:h:lucent:ascend_max_router:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_max_router:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_max_router:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_max_router:4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_max_router:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_pipeline_router:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_pipeline_router:2.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_pipeline_router:3.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_pipeline_router:4.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_pipeline_router:5.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_pipeline_router:6.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_tnt_router:1.0:*:*:*:*:*:*:*",
"cpe:2.3:h:lucent:ascend_tnt_router:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0059 | IRIX fam service allows an attacker to obtain a list of all files on the server. | [
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*"
] | null | 7.3 | null | 7.1 |
|
CVE-1999-0031 | JavaScript in Internet Explorer 3.x and 4.x, and Netscape 2.x, 3.x and 4.x, allows remote attackers to monitor a user's web activities, aka the Bell Labs vulnerability. | [
"cpe:2.3:a:microsoft:internet_explorer:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_explorer:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:communicator:4.0:*:*:*:*:*:*:*"
] | null | null | null | 2.6 |
|
CVE-1999-0124 | Vulnerabilities in UMN gopher and gopher+ versions 1.12 and 2.0x allow an intruder to read any files that can be accessed by the gopher daemon. | [
"cpe:2.3:a:university_of_minnesota:gopherd:*:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0018 | Buffer overflow in statd allows root privileges. | [
"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0121 | Buffer overflow in dtaction command gives root access. | [] | null | null | null | 7.2 |
|
CVE-1999-0150 | The Perl fingerd program allows arbitrary command execution from remote users. | [
"cpe:2.3:a:gnu:fingerd:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0113 | Some implementations of rlogin allow root access if given a -froot parameter. | [
"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2.5:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0159 | Attackers can crash a Cisco IOS router or device, provided they can get to an interactive prompt (such as a login). This applies to some IOS 9.x, 10.x, and 11.x releases. | [
"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.0\\(20.3\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.1\\(15\\)ca:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.1\\(16\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.1\\(16\\)aa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.1\\(16\\)ia:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.1\\(17\\)cc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.1\\(17\\)ct:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.2\\(8\\)sa3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.2\\(9\\)p:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.2\\(9\\)xa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.2\\(10\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.2\\(10\\)bc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.3\\(1\\):*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.3\\(1\\)ed:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.3\\(1\\)t:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0176 | The Webgais program allows a remote user to execute arbitrary commands. | [
"cpe:2.3:a:webgais_development_team:webgais:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0038 | Buffer overflow in xlock program allows local users to execute commands as root. | [
"cpe:2.3:a:ibm:xlock:*:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:6.0:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:xfs:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:xfs:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:0.93:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | 8.4 | null | 7.2 |
|
CVE-1999-0131 | Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. | [
"cpe:2.3:a:eric_allman:sendmail:8.6:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.7.1:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.7.2:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.7.3:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.7.4:*:*:*:*:*:*:*",
"cpe:2.3:a:eric_allman:sendmail:8.7.5:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:digital:osf_1:1.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0197 | finger 0@host on some systems may print information on some user accounts. | [] | null | null | null | 10 |
|
CVE-1999-0012 | Some web servers under Microsoft Windows allow remote attackers to bypass access restrictions for files with long file names. | [
"cpe:2.3:a:microsoft:frontpage:*:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:personal_web_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:fasttrack_server:2.01:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:fasttrack_server:3.01:*:*:*:*:*:*:*"
] | null | 7 | null | 5 |
|
CVE-1999-0188 | The passwd command in Solaris can be subjected to a denial of service. | [
"cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0152 | The DG/UX finger daemon allows remote command execution through shell metacharacters. | [
"cpe:2.3:a:data_general:dg_ux:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0087 | Denial of service in AIX telnet can freeze a system and prevent users from accessing the server. | [
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0009 | Inverse query buffer overflow in BIND 4.9 and BIND 8 Releases. | [
"cpe:2.3:a:data_general:dg_ux:5.4_3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:5.4_3.1:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:5.4_4.1:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:5.4_4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9.6:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:3.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:3.3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:3.3.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.1t:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.4b:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.4t:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5_iop:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5_ipr:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5a:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5d:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5e:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5f:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5g:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:4.0.5h:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1.5:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:asl_ux_4800:64:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0195 | Denial of service in RPC portmapper allows attackers to register or unregister RPC services or spoof RPC services using a spoofed source IP address such as 127.0.0.1. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0148 | The handler CGI program in IRIX allows arbitrary command execution. | [
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.4:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0007 | Information from SSL-encrypted sessions via PKCS #1. | [
"cpe:2.3:a:c2net:stonghold_web_server:2.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:c2net:stonghold_web_server:2.2:*:*:*:*:*:*:*",
"cpe:2.3:a:c2net:stonghold_web_server:2.3:*:*:*:*:*:*:*",
"cpe:2.3:a:hp:open_market_secure_webserver:2.1:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*",
"cpe:2.3:a:netscape:collabra_server:3.5.2:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*",
"cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*",
"cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:fasttrack_server:3.01b:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:messaging_server:3.54:*:*:*:*:*:*:*",
"cpe:2.3:a:netscape:proxy_server:3.5.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssleay:ssleay:0.6.6:*:*:*:*:*:*:*",
"cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*",
"cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-2024-37002 | Multiple Vulnerabilities in the Autodesk AutoCAD Desktop Software | A maliciously crafted MODEL file, when parsed in ASMkern229A.dllthrough Autodesk applications, can be used to uninitialized variables. This vulnerability, along with other vulnerabilities, could lead to code execution in the current process. | [
"cpe:2.3:a:autodesk:autocad_advance_steel:*:*:*:*:*:*:*:*",
"cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*"
] | null | 7.8 | null | null |
CVE-1999-0077 | Predictable TCP sequence numbers allow spoofing. | [
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0153 | Windows 95/NT out of band (OOB) data denial of service through NETBIOS port, aka WinNuke. | [
"cpe:2.3:o:microsoft:windows_2000:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0025 | root privileges via buffer overflow in df command on SGI IRIX systems. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0017 | FTP servers can allow an attacker to connect to arbitrary ports on machines other than the FTP client, aka FTP bounce. | [
"cpe:2.3:a:gnu:inet:5.01:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:inet:6.01:*:*:*:*:*:*:*",
"cpe:2.3:a:gnu:inet:6.02:*:*:*:*:*:*:*",
"cpe:2.3:a:washington_university:wu-ftpd:2.4:*:*:*:*:*:*:*",
"cpe:2.3:o:caldera:openlinux:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:freebsd:freebsd:2.1.7:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.0:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.1:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.2:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:siemens:reliant_unix:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0063 | Cisco IOS 12.0 and other versions can be crashed by malicious UDP packets to the syslog port. | [
"cpe:2.3:o:cisco:ios:11.3aa:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.3db:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)w:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xa3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xb:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(1\\)xe:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xc:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0\\(2\\)xd:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0db:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0s:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:12.0t:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0118 | AIX infod allows local users to gain root access through an X display. | [
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0108 | The printers program in IRIX has a buffer overflow that gives root access to local users. | [
"cpe:2.3:o:sgi:irix:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0039 | webdist CGI program (webdist.cgi) in SGI IRIX allows remote attackers to execute arbitrary commands via shell metacharacters in the distloc parameter. | [
"cpe:2.3:o:sgi:irix:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.3:*:*:*:*:*:*:*"
] | null | 7.3 | null | 7.5 |
|
CVE-1999-0144 | Denial of service in Qmail by specifying a large number of recipients with the RCPT command. | [
"cpe:2.3:a:qmail_project:qmail:-:*:*:*:*:*:*:*"
] | null | null | null | 2.1 |
|
CVE-1999-0006 | Buffer overflow in POP servers based on BSD/Qualcomm's qpopper allows remote attackers to gain root access using a long PASS command. | [
"cpe:2.3:a:qualcomm:qpopper:2.4:*:*:*:*:*:*:*"
] | null | 9.8 | null | 10 |
|
CVE-1999-0154 | IIS 2.0 and 3.0 allows remote attackers to read the source code for ASP pages by appending a . (dot) to the end of the URL. | [
"cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
"cpe:2.3:a:microsoft:internet_information_services:2.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0019 | Delete or create a file via rpc.statd, due to invalid information. | [
"cpe:2.3:a:data_general:dg_ux:4.11:*:*:*:*:*:*:*",
"cpe:2.3:a:ncr:mp-ras:2.03:*:*:*:*:*:*:*",
"cpe:2.3:a:ncr:mp-ras:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:nighthawk:cx_ux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:nighthawk:powerux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:2:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:2:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0074 | Listening TCP ports are sequentially allocated, allowing spoofing attacks. | [
"cpe:2.3:o:freebsd:freebsd:6.2:stable:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:*:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:2.0.4:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-1999-0147 | The aglimpse CGI program of the Glimpse package allows remote execution of arbitrary commands. | [
"cpe:2.3:a:university_of_arizona:glimpse_http:2.0:*:*:*:*:*:*:*",
"cpe:2.3:a:university_of_arizona:webglimpse:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0049 | Csetup under IRIX allows arbitrary file creation or overwriting. | [
"cpe:2.3:o:sgi:irix:5:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0117 | AIX passwd allows local users to gain root access. | [
"cpe:2.3:o:ibm:aix:3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0101 | Buffer overflow in AIX and Solaris "gethostbyname" library call allows root access through corrupt DNS host names. | [
"cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0155 | The ghostscript command with the -dSAFER option allows remote attackers to execute commands. | [
"cpe:2.3:a:aladdin_enterprises:ghostscript:2.6:*:*:*:*:*:*:*",
"cpe:2.3:a:aladdin_enterprises:ghostscript:3.22:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0103 | Echo and chargen, or other combinations of UDP services, can be used in tandem to flood the server, a.k.a. UDP bomb or UDP packet storm. | [] | null | null | null | 5 |
|
CVE-1999-0010 | Denial of Service vulnerability in BIND 8 Releases via maliciously formatted DNS messages. | [
"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.11mu05:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.12mu03:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu01:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu02:*:*:*:*:*:*:*",
"cpe:2.3:a:data_general:dg_ux:y2k_patchr4.20mu03:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:4.9:*:*:*:*:*:*:*",
"cpe:2.3:a:isc:bind:8:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:ibm:aix:4.3:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:asl_ux_4800:11:*:*:*:*:*:*:*",
"cpe:2.3:o:nec:asl_ux_4800:13:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3:*:*:*:*:*:*:*",
"cpe:2.3:o:netbsd:netbsd:1.3.1:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:4.2:*:*:*:*:*:*:*",
"cpe:2.3:o:redhat:linux:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:open_desktop:3.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unix:3.2v4:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:2.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sco:unixware:7.0:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.3:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.6:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0149 | The wrap CGI program in IRIX allows remote attackers to view arbitrary directory listings via a .. (dot dot) attack. | [
"cpe:2.3:o:sgi:irix:6.2:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0134 | vold in Solaris 2.x allows local users to gain root access. | [
"cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.4:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:x86:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0146 | The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file. | [
"cpe:2.3:a:ncsa:campas:*:*:*:*:*:*:*:*",
"cpe:2.3:a:ncsa:servers:*:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0058 | Buffer overflow in PHP cgi program, php.cgi allows shell access. | [
"cpe:2.3:a:php:php:1.0:*:*:*:*:*:*:*",
"cpe:2.3:a:php:php:2.0b10:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
|
CVE-1999-0186 | In Solaris, an SNMP subagent has a default community string that allows remote attackers to execute arbitrary commands as root, or modify system parameters. | [
"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*"
] | null | null | null | 10 |
|
CVE-1999-0127 | swinstall and swmodify commands in SD-UX package in HP-UX systems allow local users to create or overwrite arbitrary files to gain root access. | [
"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0109 | Buffer overflow in ffbconfig in Solaris 2.5.1. | [
"cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
"cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*"
] | null | null | null | 7.2 |
|
CVE-1999-0193 | Denial of service in Ascend and 3com routers, which can be rebooted by sending a zero length TCP option. | [
"cpe:2.3:a:ascend:cascadeview_ux:1.0:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0081 | wu-ftp allows files to be overwritten via the rnfr command. | [
"cpe:2.3:a:washington_university:wu-ftpd:*:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0104 | A later variation on the Teardrop IP denial of service attack, a.k.a. Teardrop-2. | [
"cpe:2.3:o:caldera:openlinux:2.0:*:*:*:*:*:*:*",
"cpe:2.3:o:hp:hp-ux:*:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_95:0a:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:*:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp1:*:*:*:*:*:*",
"cpe:2.3:o:microsoft:windows_nt:4.0:sp2:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.3u1:*:*:*:*:*:*:*",
"cpe:2.3:o:sun:sunos:4.1.4:*:*:*:*:*:*:*"
] | null | null | null | 5 |
|
CVE-1999-0183 | Linux implementations of TFTP would allow access to files outside the restricted directory. | [
"cpe:2.3:a:tftp:tftp:*:*:*:*:*:*:*:*",
"cpe:2.3:o:linux:linux_kernel:2.6.20.1:*:*:*:*:*:*:*"
] | null | null | null | 6.4 |
|
CVE-1999-0160 | Some classic Cisco IOS devices have a vulnerability in the PPP CHAP authentication to establish unauthorized PPP connections. | [
"cpe:2.3:o:cisco:ios:4.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:9.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:10.3:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.0:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.1:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.2:*:*:*:*:*:*:*",
"cpe:2.3:o:cisco:ios:11.2p:*:*:*:*:*:*:*"
] | null | null | null | 7.5 |
End of preview. Expand
in Data Studio
README.md exists but content is empty.
- Downloads last month
- 60