instruction
stringlengths 23
50
| input
stringlengths 22
57
| output
stringlengths 21
143k
|
---|---|---|
Describe CVE-1999-1555. | What is CVE-1999-1555? | Cheyenne InocuLAN Anti-Virus Server in Inoculan 4.0 before Service Pack 2 creates an update directory with "EVERYONE FULL CONTROL" permissions, which allows local users to cause Inoculan's antivirus update feature to install a Trojan horse dll.. |
Provide references for CVE-1999-1555. | Where can I find more information about CVE-1999-1555? | References are available at: http://www.securityfocus.com/archive/1/9515, http://www.securityfocus.com/bid/106, https://exchange.xforce.ibmcloud.com/vulnerabilities/1536. |
State the publication date of CVE-1999-1555. | When was CVE-1999-1555 published? | CVE-1999-1555 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1404. | What is CVE-1999-1404? | IBM/Tivoli OPC Tracker Agent version 2 release 1 allows remote attackers to cause a denial of service (resource exhaustion) via malformed data to the localtracker client port (5011), which prevents the connection from being closed properly.. |
Provide references for CVE-1999-1404. | Where can I find more information about CVE-1999-1404? | References are available at: http://www.securityfocus.com/archive/1/10771, http://www.securityfocus.com/bid/382. |
State the publication date of CVE-1999-1404. | When was CVE-1999-1404 published? | CVE-1999-1404 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1409. | What is CVE-1999-1409? | The at program in IRIX 6.2 and NetBSD 1.3.2 and earlier allows local users to read portions of arbitrary files by submitting the file to at with the -f argument, which generates error messages that at sends to the user via e-mail.. |
Provide references for CVE-1999-1409. | Where can I find more information about CVE-1999-1409? | References are available at: http://www.securityfocus.com/bid/331, http://www.shmoo.com/mail/bugtraq/jul98/msg00064.html, ftp://ftp.NetBSD.ORG/pub/NetBSD/security/advisories/NetBSD-SA1998-004.txt.asc, http://www.iss.net/security_center/static/7577.php, http://marc.info/?l=bugtraq&m=90233906612929&w=2. |
State the publication date of CVE-1999-1409. | When was CVE-1999-1409 published? | CVE-1999-1409 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1353. | What is CVE-1999-1353? | Nosque MsgCore 2.14 stores passwords in cleartext: (1) the administrator password in the AdmPasswd registry key, and (2) user passwords in the Userbase.dbf data file, which could allow local users to gain privileges.. |
Provide references for CVE-1999-1353. | Where can I find more information about CVE-1999-1353? | References are available at: http://marc.info/?l=ntbugtraq&m=93698162708211&w=2. |
State the publication date of CVE-1999-1353. | When was CVE-1999-1353 published? | CVE-1999-1353 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1365. | What is CVE-1999-1365? | Windows NT searches a user's home directory (%systemroot% by default) before other directories to find critical programs such as NDDEAGNT.EXE, EXPLORER.EXE, USERINIT.EXE or TASKMGR.EXE, which could allow local users to bypass access restrictions or gain privileges by placing a Trojan horse program into the root directory, which is writable by default.. |
Provide references for CVE-1999-1365. | Where can I find more information about CVE-1999-1365? | References are available at: http://www.securityfocus.com/bid/515, http://marc.info/?l=ntbugtraq&m=93069418400856&w=2, http://marc.info/?l=ntbugtraq&m=93127894731200&w=2, https://exchange.xforce.ibmcloud.com/vulnerabilities/2336. |
State the publication date of CVE-1999-1365. | When was CVE-1999-1365 published? | CVE-1999-1365 was published on 2004-09-01T04:00:00. |
Describe CVE-1999-1055. | What is CVE-1999-1055? | Microsoft Excel 97 does not warn the user before executing worksheet functions, which could allow attackers to execute arbitrary commands by using the CALL function to execute a malicious DLL, aka the Excel "CALL Vulnerability.". |
Provide references for CVE-1999-1055. | Where can I find more information about CVE-1999-1055? | References are available at: https://exchange.xforce.ibmcloud.com/vulnerabilities/1737, https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-018, http://www.securityfocus.com/bid/179. |
State the publication date of CVE-1999-1055. | When was CVE-1999-1055 published? | CVE-1999-1055 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1357. | What is CVE-1999-1357? | Netscape Communicator 4.04 through 4.7 (and possibly other versions) in various UNIX operating systems converts the 0x8b character to a "<" sign, and the 0x9b character to a ">" sign, which could allow remote attackers to attack other clients via cross-site scripting (CSS) in CGI programs that do not filter these characters.. |
Provide references for CVE-1999-1357. | Where can I find more information about CVE-1999-1357? | References are available at: http://marc.info/?l=bugtraq&m=93915331626185&w=2. |
State the publication date of CVE-1999-1357. | When was CVE-1999-1357 published? | CVE-1999-1357 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1497. | What is CVE-1999-1497? | Ipswitch IMail 5.0 and 6.0 uses weak encryption to store passwords in registry keys, which allows local attackers to read passwords for e-mail accounts.. |
Provide references for CVE-1999-1497. | Where can I find more information about CVE-1999-1497? | References are available at: http://www.securityfocus.com/archive/1/39329, http://www.securityfocus.com/bid/880. |
State the publication date of CVE-1999-1497. | When was CVE-1999-1497 published? | CVE-1999-1497 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1221. | What is CVE-1999-1221? | dxchpwd in Digital Unix (OSF/1) 3.x allows local users to modify arbitrary files via a symlink attack on the dxchpwd.log file.. |
Provide references for CVE-1999-1221. | Where can I find more information about CVE-1999-1221? | References are available at: http://marc.info/?l=bugtraq&m=87602167420141&w=2, https://exchange.xforce.ibmcloud.com/vulnerabilities/399. |
State the publication date of CVE-1999-1221. | When was CVE-1999-1221 published? | CVE-1999-1221 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1052. | What is CVE-1999-1052? | Microsoft FrontPage stores form results in a default location in /_private/form_results.txt, which is world-readable and accessible in the document root, which allows remote attackers to read possibly sensitive information submitted by other users.. |
Provide references for CVE-1999-1052. | Where can I find more information about CVE-1999-1052? | References are available at: http://marc.info/?l=bugtraq&m=93582550911564&w=2. |
State the publication date of CVE-1999-1052. | When was CVE-1999-1052 published? | CVE-1999-1052 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1492. | What is CVE-1999-1492? | Vulnerability in (1) diskperf and (2) diskalign in IRIX 6.4 allows local attacker to create arbitrary root owned files, leading to root privileges.. |
Provide references for CVE-1999-1492. | Where can I find more information about CVE-1999-1492? | References are available at: https://exchange.xforce.ibmcloud.com/vulnerabilities/2103, http://www.securityfocus.com/bid/348, https://exchange.xforce.ibmcloud.com/vulnerabilities/2104, ftp://patches.sgi.com/support/free/security/advisories/19980502-01-P3030. |
State the publication date of CVE-1999-1492. | When was CVE-1999-1492 published? | CVE-1999-1492 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1222. | What is CVE-1999-1222? | Netbt.sys in Windows NT 4.0 allows remote malicious DNS servers to cause a denial of service (crash) by returning 0.0.0.0 as the IP address for a DNS host name lookup.. |
Provide references for CVE-1999-1222. | Where can I find more information about CVE-1999-1222? | References are available at: http://support.microsoft.com/support/kb/articles/Q188/5/71.ASP, https://exchange.xforce.ibmcloud.com/vulnerabilities/3893. |
State the publication date of CVE-1999-1222. | When was CVE-1999-1222 published? | CVE-1999-1222 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1585. | What is CVE-1999-1585? | The (1) rcS and (2) mountall programs in Sun Solaris 2.x, possibly before 2.4, start a privileged shell on the system console if fsck fails while the system is booting, which allows attackers with physical access to gain root privileges.. |
Provide references for CVE-1999-1585. | Where can I find more information about CVE-1999-1585? | References are available at: http://sunsolve.sun.com/search/document.do?assetkey=1-22-00124-1. |
State the publication date of CVE-1999-1585. | When was CVE-1999-1585 published? | CVE-1999-1585 was published on 2005-08-30T04:00:00Z. |
Describe CVE-1999-1124. | What is CVE-1999-1124? | HTTP Client application in ColdFusion allows remote attackers to bypass access restrictions for web pages on other ports by providing the target page to the mainframeset.cfm application, which requests the page from the server, making it look like the request is coming from the local host.. |
Provide references for CVE-1999-1124. | Where can I find more information about CVE-1999-1124? | References are available at: http://packetstorm.securify.com/mag/phrack/phrack54/P54-08. |
State the publication date of CVE-1999-1124. | When was CVE-1999-1124 published? | CVE-1999-1124 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1322. | What is CVE-1999-1322? | The installation of 1ArcServe Backup and Inoculan AV client modules for Exchange create a log file, exchverify.log, which contains usernames and passwords in plaintext.. |
Provide references for CVE-1999-1322. | Where can I find more information about CVE-1999-1322? | References are available at: http://marc.info/?l=ntbugtraq&m=91096758513985&w=2, http://marc.info/?l=ntbugtraq&m=91133714919229&w=2. |
State the publication date of CVE-1999-1322. | When was CVE-1999-1322 published? | CVE-1999-1322 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1590. | What is CVE-1999-1590? | Directory traversal vulnerability in Muhammad A. Muquit wwwcount (Count.cgi) 2.3 allows remote attackers to read arbitrary GIF files via ".." sequences in the image parameter, a different vulnerability than CVE-1999-0021.. |
Provide references for CVE-1999-1590. | Where can I find more information about CVE-1999-1590? | References are available at: http://seclists.org/bugtraq/1997/Oct/0058.html. |
State the publication date of CVE-1999-1590. | When was CVE-1999-1590 published? | CVE-1999-1590 was published on 2006-12-03T11:00:00Z. |
Describe CVE-1999-1198. | What is CVE-1999-1198? | BuildDisk program on NeXT systems before 2.0 does not prompt users for the root password, which allows local users to gain root privileges.. |
Provide references for CVE-1999-1198. | Where can I find more information about CVE-1999-1198? | References are available at: http://www.cert.org/advisories/CA-1990-06.html, http://ciac.llnl.gov/ciac/bulletins/b-01.shtml, http://www.iss.net/security_center/static/7141.php, http://www.securityfocus.com/bid/11. |
State the publication date of CVE-1999-1198. | When was CVE-1999-1198 published? | CVE-1999-1198 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1004. | What is CVE-1999-1004? | Buffer overflow in the POP server POProxy for the Norton Anti-Virus protection NAV2000 program via a large USER command.. |
Provide references for CVE-1999-1004. | Where can I find more information about CVE-1999-1004? | References are available at: http://www.securityfocus.com/archive/1/39194, http://www.osvdb.org/6267, http://service1.symantec.com/SUPPORT/nav.nsf/df0a595864594c86852567ac0063608c/6206f660a1f2516a882568660082c930?OpenDocument&Highlight=0%2Cpoproxy, http://www.securityfocus.com/archive/1/38970. |
State the publication date of CVE-1999-1004. | When was CVE-1999-1004 published? | CVE-1999-1004 was published on 2000-10-13T04:00:00. |
Describe CVE-1999-1284. | What is CVE-1999-1284? | NukeNabber allows remote attackers to cause a denial of service by connecting to the NukeNabber port (1080) without sending any data, which causes the CPU usage to rise to 100% from the report.exe program that is executed upon the connection.. |
Provide references for CVE-1999-1284. | Where can I find more information about CVE-1999-1284? | References are available at: http://www.dynamsol.com/puppet/text/new.txt, http://marc.info/?l=bugtraq&m=91063407332594&w=2, http://www.securityfocus.com/archive/1/11131, https://exchange.xforce.ibmcloud.com/vulnerabilities/1540. |
State the publication date of CVE-1999-1284. | When was CVE-1999-1284 published? | CVE-1999-1284 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1319. | What is CVE-1999-1319? | Vulnerability in object server program in SGI IRIX 5.2 through 6.1 allows remote attackers to gain root privileges in certain configurations.. |
Provide references for CVE-1999-1319. | Where can I find more information about CVE-1999-1319? | References are available at: ftp://patches.sgi.com/support/free/security/advisories/19960101-01-PX, http://www.iss.net/security_center/static/7430.php. |
State the publication date of CVE-1999-1319. | When was CVE-1999-1319 published? | CVE-1999-1319 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1115. | What is CVE-1999-1115? | Vulnerability in the /etc/suid_exec program in HP Apollo Domain/OS sr10.2 and sr10.3 beta, related to the Korn Shell (ksh).. |
Provide references for CVE-1999-1115. | Where can I find more information about CVE-1999-1115? | References are available at: http://www.iss.net/security_center/static/6721.php, http://www.cert.org/advisories/CA-1990-04.html, http://www.securityfocus.com/bid/7, http://www.ciac.org/ciac/bulletins/a-30.shtml. |
State the publication date of CVE-1999-1115. | When was CVE-1999-1115 published? | CVE-1999-1115 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1150. | What is CVE-1999-1150? | Livingston Portmaster routers running ComOS use the same initial sequence number (ISN) for TCP connections, which allows remote attackers to conduct spoofing and hijack TCP sessions.. |
Provide references for CVE-1999-1150. | Where can I find more information about CVE-1999-1150? | References are available at: http://www.securityfocus.com/archive/1/9723, https://exchange.xforce.ibmcloud.com/vulnerabilities/1882. |
State the publication date of CVE-1999-1150. | When was CVE-1999-1150 published? | CVE-1999-1150 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1452. | What is CVE-1999-1452? | GINA in Windows NT 4.0 allows attackers with physical access to display a portion of the clipboard of the user who has locked the workstation by pasting (CTRL-V) the contents into the username prompt.. |
Provide references for CVE-1999-1452. | Where can I find more information about CVE-1999-1452? | References are available at: http://marc.info/?l=ntbugtraq&m=91822011021558&w=2, http://marc.info/?l=bugtraq&m=91788829326419&w=2, http://marc.info/?l=ntbugtraq&m=91764169410814&w=2, http://www.securityfocus.com/bid/198, https://exchange.xforce.ibmcloud.com/vulnerabilities/1975, http://support.microsoft.com/support/kb/articles/q214/8/02.asp. |
State the publication date of CVE-1999-1452. | When was CVE-1999-1452 published? | CVE-1999-1452 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1575. | What is CVE-1999-1575? | The Kodak/Wang (1) Image Edit (imgedit.ocx), (2) Image Annotation (imgedit.ocx), (3) Image Scan (imgscan.ocx), (4) Thumbnail Image (imgthumb.ocx), (5) Image Admin (imgadmin.ocx), (6) HHOpen (hhopen.ocx), (7) Registration Wizard (regwizc.dll), and (8) IE Active Setup (setupctl.dll) ActiveX controls for Internet Explorer (IE) 4.01 and 5.0 are marked as "Safe for Scripting," which allows remote attackers to create and modify files and execute arbitrary commands.. |
Provide references for CVE-1999-1575. | Where can I find more information about CVE-1999-1575? | References are available at: http://www.kb.cert.org/vuls/id/41408, http://www.kb.cert.org/vuls/id/24839, https://docs.microsoft.com/en-us/security-updates/securitybulletins/1999/ms99-037, http://www.kb.cert.org/vuls/id/26924, http://www.kb.cert.org/vuls/id/9162, https://exchange.xforce.ibmcloud.com/vulnerabilities/7097, http://www.securityfocus.com/archive/1/28719, http://www.kb.cert.org/vuls/id/23412. |
State the publication date of CVE-1999-1575. | When was CVE-1999-1575 published? | CVE-1999-1575 was published on 2005-04-21T04:00:00. |
Describe CVE-1999-1354. | What is CVE-1999-1354? | E-mail client in Softarc FirstClass Internet Server 5.506 and earlier stores usernames and passwords in cleartext in the files (1) home.fc for version 5.506, (2) network.fc for version 3.5, or (3) FCCLIENT.LOG when logging is enabled.. |
Provide references for CVE-1999-1354. | Where can I find more information about CVE-1999-1354? | References are available at: http://marc.info/?l=ntbugtraq&m=93698283309513&w=2, http://marc.info/?l=ntbugtraq&m=93637687305327&w=2. |
State the publication date of CVE-1999-1354. | When was CVE-1999-1354 published? | CVE-1999-1354 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1305. | What is CVE-1999-1305? | Vulnerability in "at" program in SCO UNIX 4.2 and earlier allows local users to gain root access.. |
Provide references for CVE-1999-1305. | Where can I find more information about CVE-1999-1305? | References are available at: http://ciac.llnl.gov/ciac/bulletins/f-05.shtml, http://ciac.llnl.gov/ciac/bulletins/f-05.shtml. |
State the publication date of CVE-1999-1305. | When was CVE-1999-1305 published? | CVE-1999-1305 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1000. | What is CVE-1999-1000? | The web administration interface for Cisco Cache Engine allows remote attackers to view performance statistics.. |
Provide references for CVE-1999-1000. | Where can I find more information about CVE-1999-1000? | References are available at: https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-1000. |
State the publication date of CVE-1999-1000. | When was CVE-1999-1000 published? | CVE-1999-1000 was published on 2000-03-22T05:00:00. |
Describe CVE-1999-1209. | What is CVE-1999-1209? | Vulnerability in scoterm in SCO OpenServer 5.0 and SCO Open Desktop/Open Server 3.0 allows local users to gain root privileges.. |
Provide references for CVE-1999-1209. | Where can I find more information about CVE-1999-1209? | References are available at: http://www.cert.org/vendor_bulletins/VB-97.14.scoterm, http://marc.info/?l=bugtraq&m=88131151000069&w=2, https://exchange.xforce.ibmcloud.com/vulnerabilities/690. |
State the publication date of CVE-1999-1209. | When was CVE-1999-1209 published? | CVE-1999-1209 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1240. | What is CVE-1999-1240? | Buffer overflow in cddbd CD database server allows remote attackers to execute arbitrary commands via a long log message.. |
Provide references for CVE-1999-1240. | Where can I find more information about CVE-1999-1240? | References are available at: https://exchange.xforce.ibmcloud.com/vulnerabilities/2203, http://www.securityfocus.com/archive/1/5784. |
State the publication date of CVE-1999-1240. | When was CVE-1999-1240 published? | CVE-1999-1240 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1215. | What is CVE-1999-1215? | LOGIN.EXE program in Novell Netware 4.0 and 4.01 temporarily writes user name and password information to disk, which could allow local users to gain privileges.. |
Provide references for CVE-1999-1215. | Where can I find more information about CVE-1999-1215? | References are available at: http://www.cert.org/advisories/CA-1993-12.html, http://ciac.llnl.gov/ciac/bulletins/d-21.shtml, https://exchange.xforce.ibmcloud.com/vulnerabilities/545. |
State the publication date of CVE-1999-1215. | When was CVE-1999-1215 published? | CVE-1999-1215 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1136. | What is CVE-1999-1136? | Vulnerability in Predictive on HP-UX 11.0 and earlier, and MPE/iX 5.5 and earlier, allows attackers to compromise data transfer for Predictive messages (using e-mail or modem) between customer and Response Center Predictive systems.. |
Provide references for CVE-1999-1136. | Where can I find more information about CVE-1999-1136? | References are available at: https://exchange.xforce.ibmcloud.com/vulnerabilities/1413, http://www.codetalker.com/advisories/vendor/hp/hpsbux9807-081.html, http://marc.info/?l=bugtraq&m=90221104526177&w=2, http://cert.ip-plus.net/bulletin-archive/msg00040.html, http://www.ciac.org/ciac/bulletins/i-081.shtml. |
State the publication date of CVE-1999-1136. | When was CVE-1999-1136 published? | CVE-1999-1136 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1533. | What is CVE-1999-1533? | Eicon Technology Diva LAN ISDN modem allows a remote attacker to cause a denial of service (hang) via a long password argument to the login.htm file in its HTTP service.. |
Provide references for CVE-1999-1533. | Where can I find more information about CVE-1999-1533? | References are available at: http://marc.info/?l=bugtraq&m=93846522511387&w=2, http://www.securityfocus.com/bid/665, https://exchange.xforce.ibmcloud.com/vulnerabilities/3317. |
State the publication date of CVE-1999-1533. | When was CVE-1999-1533 published? | CVE-1999-1533 was published on 2001-09-12T04:00:00. |
Describe CVE-1999-1423. | What is CVE-1999-1423? | ping in Solaris 2.3 through 2.6 allows local users to cause a denial of service (crash) via a ping request to a multicast address through the loopback interface, e.g. via ping -i.. |
Provide references for CVE-1999-1423. | Where can I find more information about CVE-1999-1423? | References are available at: http://marc.info/?l=bugtraq&m=87602558319160&w=2, http://marc.info/?l=bugtraq&m=87602558319171&w=2, http://sunsolve.sun.com/pub-cgi/retrieve.pl?doctype=coll&doc=secbull/146, http://www.securityfocus.com/bid/209, http://www.iss.net/security_center/static/7492.php, http://marc.info/?l=bugtraq&m=87602558319180&w=2, http://marc.info/?l=bugtraq&m=87602558319181&w=2. |
State the publication date of CVE-1999-1423. | When was CVE-1999-1423 published? | CVE-1999-1423 was published on 2002-03-09T05:00:00. |
Describe CVE-1999-1439. | What is CVE-1999-1439? | gcc 2.7.2 allows local users to overwrite arbitrary files via a symlink attack on temporary .i, .s, or .o files.. |
Subsets and Splits