cve
stringlengths 13
16
| cwe
stringclasses 474
values | affected_component
stringlengths 0
255
| summary
stringlengths 0
246
| severity
stringclasses 5
values | cvss_v2
stringclasses 250
values | cvss_v3
stringlengths 37
48
⌀ | description
stringlengths 20
4k
| statement
stringlengths 31
2.49k
⌀ | discovery_date
stringlengths 25
32
⌀ | release_date
stringlengths 25
32
| fixed_products
sequencelengths 0
28.2k
| known_affected_products
sequencelengths 0
599
| known_not_affected_products
sequencelengths 0
30.2k
| under_investigation_products
sequencelengths 0
78
| threat_categories
sequencelengths 0
4
| threat_details
sequencelengths 0
4
| threat_dates
sequencelengths 0
4
| remediation_categories
sequencelengths 0
217
| remediation_details
sequencelengths 0
217
| remediation_dates
sequencelengths 0
217
|
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
CVE-1999-1254 | null | CVE-1999-1254 | null | null | null | Windows 95, 98, and NT 4.0 allow remote attackers to cause a denial of service by spoofing ICMP redirect messages from a router, which causes Windows to change its routing tables. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-03-08T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0916 | null | CVE-1999-0916 | null | null | null | WebTrends software stores account names and passwords in a file which does not have restricted access permissions. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-07-04T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0445 | null | CVE-1999-0445 | null | null | null | In Cisco routers under some versions of IOS 12.0 running NAT, some packets may not be filtered by input access list filters. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0015 | null | CVE-1999-0015 | null | null | null | Teardrop IP denial of service. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0150 | null | CVE-1999-0150 | null | null | null | The Perl fingerd program allows arbitrary command execution from remote users. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1311 | null | CVE-1999-1311 | null | null | null | Vulnerability in dtlogin and dtsession in HP-UX 10.20 and 10.10 allows local users to bypass authentication and gain privileges. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0853 | null | CVE-1999-0853 | null | null | null | Buffer overflow in Netscape Enterprise Server and Netscape FastTrack Server allows remote attackers to gain privileges via the HTTP Basic Authentication procedure. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-12-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0384 | null | CVE-1999-0384 | null | null | null | The Forms 2.0 ActiveX control (included with Visual Basic for Applications 5.0) can be used to read text from a user's clipboard when the user accesses documents with ActiveX content. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0691 | null | CVE-1999-0691 | null | null | null | Buffer overflow in the AddSuLog function of the CDE dtaction utility allows local users to gain root privileges via a long user name. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1080 | null | CVE-1999-1080 | null | null | null | rmmount in SunOS 5.7 may mount file systems without the nosuid flag set, contrary to the documentation and its use in previous versions of SunOS, which could allow local users with physical access to gain root privileges by mounting a floppy or CD-ROM that contains a setuid program and running volcheck, when the file systems do not have the nosuid option specified in rmmount.conf. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-05-10T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0042 | null | CVE-1999-0042 | null | null | null | Buffer overflow in University of Washington's implementation of IMAP and POP servers. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0412 | null | CVE-1999-0412 | null | null | null | In IIS and other web servers, an attacker can attack commands as SYSTEM if the server is running as SYSTEM and loading an ISAPI extension. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0941 | null | CVE-1999-0941 | null | null | null | Mutt mail client allows a remote attacker to execute commands via shell metacharacters. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1203 | null | CVE-1999-1203 | null | null | null | Multilink PPP for ISDN dialup users in Ascend before 4.6 allows remote attackers to cause a denial of service via a spoofed endpoint identifier. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-02-10T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0804 | null | security flaw | None | null | null | Denial of service in Linux 2.2.x kernels via malformed ICMP packets containing unusual types, codes, and IP header lengths. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-06-03T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1346 | null | CVE-1999-1346 | null | null | null | PAM configuration file for rlogin in Red Hat Linux 6.1 and earlier includes a less restrictive rule before a more restrictive one, which allows users to access the host via rlogin even if rlogin has been explicitly disabled using the /etc/nologin file. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-10-07T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0107 | null | CVE-1999-0107 | null | null | null | Buffer overflow in Apache 1.2.5 and earlier allows a remote attacker to cause a denial of service with a large number of GET requests containing a large number of / characters. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0238 | null | CVE-1999-0238 | null | null | null | php.cgi allows attackers to read any file on the system. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0392 | null | CVE-1999-0392 | null | null | null | Buffer overflow in Thomas Boutell's cgic library version up to 1.05. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0668 | null | CVE-1999-0668 | null | null | null | The scriptlet.typelib ActiveX control is marked as "safe for scripting" for Internet Explorer, which allows a remote attacker to execute arbitrary commands as demonstrated by Bubbleboy. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-08-21T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1429 | null | CVE-1999-1429 | null | null | null | DIT TransferPro installs devices with world-readable and world-writable permissions, which could allow local users to damage disks through the ff device driver. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1583 | null | CVE-1999-1583 | null | null | null | Buffer overflow in nslookup for AIX 4.3 allows local users to execute arbitrary code via a long hostname command line argument. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-09-30T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1079 | null | CVE-1999-1079 | null | null | null | Vulnerability in ptrace in AIX 4.3 allows local users to gain privileges by attaching to a setgid program. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1096 | null | CVE-1999-1096 | null | null | null | Buffer overflow in kscreensaver in KDE klock allows local users to gain root privileges via a long HOME environmental variable. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0687 | null | CVE-1999-0687 | null | null | null | The ToolTalk ttsession daemon uses weak RPC authentication, which allows a remote attacker to execute commands. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1215 | null | CVE-1999-1215 | null | null | null | LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0957 | null | CVE-1999-0957 | null | null | null | MajorCool mj_key_cache program allows local users to modify files via a symlink attack. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0404 | null | CVE-1999-0404 | null | null | null | Buffer overflow in the Mail-Max SMTP server for Windows systems allows remote command execution. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0054 | null | CVE-1999-0054 | null | null | null | Sun's ftpd daemon can be subjected to a denial of service. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0541 | null | CVE-1999-0541 | null | null | null | A password for accessing a WWW URL is guessable. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0111 | null | CVE-1999-0111 | null | null | null | RIP v1 is susceptible to spoofing. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1350 | null | CVE-1999-1350 | null | null | null | ARCAD Systemhaus 0.078-5 installs critical programs and files with world-writeable permissions, which could allow local users to gain privileges by replacing a program with a Trojan horse. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-09-29T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0812 | null | CVE-1999-0812 | null | null | null | Race condition in Samba smbmnt allows local users to mount file systems in arbitrary locations. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1184 | null | CVE-1999-1184 | null | null | null | Buffer overflow in Elm 2.4 and earlier allows local users to gain privileges via a long TERM environmental variable. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0795 | null | CVE-1999-0795 | null | null | null | The NIS+ rpc.nisd server allows remote attackers to execute certain RPC calls without authentication to obtain system information, disable logging, or modify caches. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0280 | null | CVE-1999-0280 | null | null | null | Remote command execution in Microsoft Internet Explorer using .lnk and .url files. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1491 | null | CVE-1999-1491 | null | null | null | abuse.console in Red Hat 2.1 uses relative pathnames to find and execute the undrv program, which allows local users to execute arbitrary commands via a path that points to a Trojan horse program. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0003 | null | CVE-1999-0003 | null | null | null | Execute commands as root via buffer overflow in Tooltalk database server (rpc.ttdbserverd). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0453 | null | CVE-1999-0453 | null | null | null | An attacker can identify a CISCO device by sending a SYN packet to port 1999, which is for the Cisco Discovery Protocol (CDP). | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0900 | null | CVE-1999-0900 | null | null | null | Buffer overflow in rpc.yppasswdd allows a local user to gain privileges via MD5 hash generation. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1242 | null | CVE-1999-1242 | null | null | null | Vulnerability in subnetconfig in HP-UX 9.01 and 9.0 allows local users to gain privileges. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0845 | null | CVE-1999-0845 | null | null | null | Buffer overflow in SCO su program allows local users to gain root access via a long username. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-11-26T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-1307 | null | CVE-1999-1307 | null | null | null | Vulnerability in urestore in Novell UnixWare 1.1 allows local users to gain root privileges. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0146 | null | CVE-1999-0146 | null | null | null | The campas CGI program provided with some NCSA web servers allows an attacker to execute arbitrary commands via encoded carriage return characters in the query string, as demonstrated by reading the password file. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
|
CVE-1999-0516 | null | CVE-1999-0516 | null | null | null | An SNMP community name is guessable. | Red Hat Product Security has determined that this vulnerability does not affect any currently supported Red Hat product. This assessment may evolve based on further analysis and discovery. For more information about this vulnerability and the products it affects, please see the linked references. | null | 1999-01-01T00:00:00+00:00 | [] | [] | [
"red_hat_products"
] | [] | [] | [] | [] | [] | [] | [] |
Subsets and Splits