All the vulnerabilites related to netscape - directory_server
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:49
Severity ?
Summary
Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "44E0E1D0-F71C-4A3F-B3EE-97B299EF2AE7", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "47CD4C15-02C8-42F2-9AF3-E44F74DE62B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "D3DDE473-7A61-46AD-9D3B-CA299928FD44", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "046596DB-57EB-4354-A79E-B3B1D5B4DD26", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.3.2:*:*:*:*:*:*:*", "matchCriteriaId": "0755B957-CB78-4B8E-9CFE-D53389789ADA", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "17D292FA-E062-4C52-AE0A-CA7D183D9E2A", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "83E1A0EA-9E2F-407F-A72F-D5061B6CD318", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B565D82B-CAB8-4512-B7B7-0402146DD2B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "68341EA6-4FF0-4F87-AC71-4EC5D648406C", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "A91596AC-3F28-4BBD-A697-81909A5407B2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "A57A5053-018B-468C-BC18-5140E6B5B048", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7:*:*:*:*:*:*:*", "matchCriteriaId": "C2962B1B-4B7F-4527-AE4C-C76787FEDB67", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "AE921188-7A50-479F-853F-95127C9BE4E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "F710939C-8598-40FE-9D5F-A3665723A5C9", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.3:*:*:*:*:*:*:*", "matchCriteriaId": "75572113-BD36-49BB-B7A1-177EB7DD3AA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.5:*:*:*:*:*:*:*", "matchCriteriaId": "1F18265E-EE99-4D0F-B975-22A86077A611", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.7.7:*:*:*:*:*:*:*", "matchCriteriaId": "C5E3EA58-3FD3-4AD8-AA63-057F8D31301B", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.8:*:*:*:*:*:*:*", "matchCriteriaId": "A51D3086-99CB-4C01-B286-3F7F6B6FB3AB", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:network_security_services:3.9:*:*:*:*:*:*:*", "matchCriteriaId": "ACA7EB49-52A7-4AFC-9D7D-0225A430B636", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "72E930EF-CCEC-44EA-AA45-18644EFDA5F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:certificate_server:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "506D842B-339C-452A-A229-C6B59B0E038D", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*", "matchCriteriaId": "1CD1E4C9-BFF1-4818-A1B8-ECD7B54C8B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*", "matchCriteriaId": "492922BE-3B31-486C-94B5-114089E51E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "70E0FF18-9B01-4500-9599-8F085655C388", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "DE69D422-E6FF-40F5-BC73-73BE3A042DE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:4.11:*:*:*:*:*:*:*", "matchCriteriaId": "39B65825-FE48-4938-A04F-12740611681B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:4.13:*:*:*:*:*:*:*", "matchCriteriaId": "CBE13D7D-2171-44F3-84D3-4CFD024AA3A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E5E0298-99D9-476D-A7DF-36C6207482DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0.1c:*:*:*:*:*:*:*", "matchCriteriaId": "8E0069EE-831B-4E6D-9AF9-71EFC9EED509", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0a:*:*:*:*:*:*:*", "matchCriteriaId": "5234109F-AD90-4324-AA03-C5DE007D32F7", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "7A7B9FDA-DC62-4EC9-9120-A7E6795C2815", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "60812728-EC82-461E-BBDC-C5B4C1BF79E6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*", "matchCriteriaId": "D94D2CA3-9868-4F27-B31D-D3EDC256BE5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.7a:*:netware:*:*:*:*:*", "matchCriteriaId": "75FFC8CC-AB53-40CD-B6DF-C8CC17320FB7", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0l:*:*:*:*:*:*:*", "matchCriteriaId": "89FAF40A-00F0-48BA-BEE7-4722C82DC54A", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.1:*:*:*:*:*:*:*", "matchCriteriaId": "D6280F25-3BC7-4701-914A-9ADC35A1A73B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.2:*:*:*:*:*:*:*", "matchCriteriaId": "BE2CB845-D0E6-4B45-95A1-879BCCA037D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.3:*:*:*:*:*:*:*", "matchCriteriaId": "F18F9770-12E2-44D5-ABB6-EDFD2383BFF9", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.4:*:*:*:*:*:*:*", "matchCriteriaId": "5C2CB1E6-63A1-42C5-889C-7EA83CB50543", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5:*:*:*:*:*:*:*", "matchCriteriaId": "34D42A9F-449C-4F4D-B610-538BF133F744", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5:*:solaris:*:*:*:*:*", "matchCriteriaId": "5AECADB3-F1EC-4410-AECF-D2C08B18F517", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4147A43C-DA7B-4D08-90E9-72DE57B1D61D", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "3577B789-DBB6-413D-B964-B32FE3E8CD8B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:*:solaris:*:*:*:*:*", "matchCriteriaId": "FFBC4A27-818F-4B2C-818E-62FB43440DD8", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:sp1:*:*:*:*:*:*", "matchCriteriaId": "1721BFD6-7914-4ADB-8205-38964C8FFDA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:sp2:*:*:*:*:*:*", "matchCriteriaId": "4EB62E6F-87E2-4A98-B4BD-3E0036CE7640", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.6:sp3:*:*:*:*:*:*", "matchCriteriaId": "418B500F-2A05-4419-997F-E04ECA2E3626", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "9DD208FC-AC17-45DF-9A5F-D8CDA6DB3A7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "4A29E0A5-9C1D-4CCF-AEEB-FF0B32B4201D", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "0CE4230F-88A6-49DD-A05A-FCF4F2A5FF6E", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "85FAD645-5AFB-4553-85DA-D25E0333A26C", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "0D98D58B-AE93-4471-81E0-FD0A4ED1AD51", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "85C1DEB1-2628-45D4-9DB4-64A4CF9C89B0", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1:sp8:*:*:*:*:*:*", "matchCriteriaId": "F331B4BD-1381-4011-B2D9-9CD9B73F976B", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:4.1.1:*:netware:*:*:*:*:*", "matchCriteriaId": "B708CDB3-0BF9-4FE4-855F-DB6E1FE5A319", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:5.0:*:netware:*:*:*:*:*", "matchCriteriaId": "DA8D4321-3683-460F-AFAA-1D31E9B16818", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:personalization_engine:*:*:*:*:*:*:*:*", "matchCriteriaId": "C7B348FC-6FEF-4682-BC25-82E726BFB64E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_enterprise_system:2003q4:*:*:*:*:*:*:*", "matchCriteriaId": "DC8DFE4D-1FB6-41D7-AAB6-82400C6B4504", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_enterprise_system:2004q2:*:*:*:*:*:*:*", "matchCriteriaId": "132976FA-A42E-4CC0-8C8F-9A034A046B07", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:enterprise:*:*:*:*:*", "matchCriteriaId": "EE5A4BC2-ED34-4968-881E-ED6AD300AC42", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:platform:*:*:*:*:*", "matchCriteriaId": "D00790CE-CD77-4C39-80AC-5FBD298DD63A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:*:standard:*:*:*:*:*", "matchCriteriaId": "BC5F2280-EC46-4D2F-8402-FE91ECEE6A1A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.0:ur4:*:*:*:*:*:*", "matchCriteriaId": "60EBC552-FAC2-4833-B1A6-696DC06301A7", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:java_system_application_server:7.1:*:*:*:*:*:*:*", "matchCriteriaId": "E583F338-CF10-4FD5-8A86-A3CE46E863DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "352D9910-BC83-44B2-B5C0-59B8F2C23142", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:6.0:sp1:*:*:*:*:*:*", "matchCriteriaId": "F316ECED-A6E3-43AC-BA05-C42F2CB0D830", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_application_server:6.0:sp2:*:*:*:*:*:*", "matchCriteriaId": "FA32646E-1014-47D1-9C96-6CD8F0B13480", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:*:*:*:*:*:*:*", "matchCriteriaId": "33621D67-8191-42EE-8859-8B5FC30F935A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "0C6F8563-701E-4E54-A0C9-67E9DF74D60D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp10:*:*:*:*:*:*", "matchCriteriaId": "4022E5C6-5651-45DD-AF73-89CF38E71D9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp11:*:*:*:*:*:*", "matchCriteriaId": "EEF4CFCE-DEEC-4652-A96F-0C7B5A88175A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp12:*:*:*:*:*:*", "matchCriteriaId": "873034EA-B3C6-43E6-AE98-A04598D9A392", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp13:*:*:*:*:*:*", "matchCriteriaId": "AC90D2B4-4FBE-405A-BD17-F84A37DC914E", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp14:*:*:*:*:*:*", "matchCriteriaId": "04366BB7-9F1D-4EC0-AE79-9603F71166C5", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "AE01BAC9-DC57-4BC8-9BFB-9C7C94A516A8", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp3:*:*:*:*:*:*", "matchCriteriaId": "1CEA91AD-443D-4856-AC7A-3DDE0791134D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp4:*:*:*:*:*:*", "matchCriteriaId": "07C1D4DC-252A-4602-A916-32E51CCA75B1", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp5:*:*:*:*:*:*", "matchCriteriaId": "526D2FAD-4241-412C-8863-B273D3733153", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp6:*:*:*:*:*:*", "matchCriteriaId": "B8A796CB-D675-49FC-98BA-4D527211C70D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp7:*:*:*:*:*:*", "matchCriteriaId": "8693959B-7D5D-414B-8660-2A693AF24541", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp8:*:*:*:*:*:*", "matchCriteriaId": "1BDC4A06-33A1-4619-B870-7F2AF1D332F4", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:4.1:sp9:*:*:*:*:*:*", "matchCriteriaId": "8A445032-AD7B-4971-B175-DF3183A4A12C", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp3:*:*:*:*:*:*", "matchCriteriaId": "38698A3B-9597-4BC9-B112-BB908C3DE86B", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp4:*:*:*:*:*:*", "matchCriteriaId": "78587B6D-2A95-4714-9632-4F75CD552E7A", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp5:*:*:*:*:*:*", "matchCriteriaId": "279FE555-E290-4B17-855D-781C9B58ED55", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp7:*:*:*:*:*:*", "matchCriteriaId": "26A8BE1A-082B-4CB5-97D0-7964FBC93572", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.0:sp8:*:*:*:*:*:*", "matchCriteriaId": "3609AA35-6B6A-47A1-B1D4-011B735E0671", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.1:*:*:*:*:*:*:*", "matchCriteriaId": "E66F55C3-F5BD-49A7-B561-ACD8D522225D", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp1:*:*:*:*:*:*", "matchCriteriaId": "4493C646-DF4B-45C7-86F7-A71AC9B1CA97", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:one_web_server:6.1:sp2:*:*:*:*:*:*", "matchCriteriaId": "689F0A9F-8F34-4958-B869-C4FB8BC02406", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F", "vulnerable": true }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.23:*:ia64_64-bit:*:*:*:*:*", "matchCriteriaId": "D73D159B-C3D8-4BBD-8BAA-E9E8D3AD3A04", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message." } ], "id": "CVE-2004-0826", "lastModified": "2024-11-20T23:49:30.253", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": true, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11015" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://xforce.iss.net/xforce/alerts/id/180" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/11015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://xforce.iss.net/xforce/alerts/id/180" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
Buffer overflow in the LDAP component for Netscape Directory Server (NDS) 3.6 on HP-UX and other operating systems allows remote attackers to execute arbitrary code.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netscape | directory_server | 3.6 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netscape:directory_server:3.6:*:*:*:*:*:*:*", "matchCriteriaId": "68AED0FB-C89E-4404-B744-B8B5ABE5B605", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in the LDAP component for Netscape Directory Server (NDS) 3.6 on HP-UX and other operating systems allows remote attackers to execute arbitrary code." } ], "id": "CVE-2004-1236", "lastModified": "2024-11-20T23:50:25.940", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2004-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://marc.info/?l=bugtraq\u0026m=110384298016120" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/14960" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57754-1" }, { "source": "cve@mitre.org", "url": "http://www.ciac.org/ciac/bulletins/p-083.shtml" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/258905" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/12099" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18676" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://marc.info/?l=bugtraq\u0026m=110384298016120" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/14960" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57754-1" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.ciac.org/ciac/bulletins/p-083.shtml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/258905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/12099" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18676" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1999-05-01 04:00
Modified
2024-11-20 23:29
Severity ?
Summary
The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netscape | directory_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netscape:directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "33D8DAD0-34B8-4D97-B026-4305D6C73B12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users." } ], "id": "CVE-1999-0807", "lastModified": "2024-11-20T23:29:31.233", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1999-05-01T04:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Netscape (iPlanet) Certificate Management System 4.2 and Directory Server 4.12 stores the administrative password in plaintext, which could allow local and possibly remote attackers to gain administrative privileges on the server.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netscape | directory_server | 4.12 | |
sun | iplanet_certificate_management_system | 4.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netscape:directory_server:4.12:*:*:*:*:*:*:*", "matchCriteriaId": "025DC6F0-A1FF-4325-8F58-2337BA961DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:iplanet_certificate_management_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEBFF8AA-E42A-4CE9-AD08-4A1BBFFD3A90", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Netscape (iPlanet) Certificate Management System 4.2 and Directory Server 4.12 stores the administrative password in plaintext, which could allow local and possibly remote attackers to gain administrative privileges on the server." } ], "id": "CVE-2000-1076", "lastModified": "2024-11-20T23:33:57.313", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5422" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5422" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
1998-06-26 04:00
Modified
2024-11-20 23:27
Severity ?
Summary
Information from SSL-encrypted sessions via PKCS #1.
References
▼ | URL | Tags | |
---|---|---|---|
cve@mitre.org | https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
c2net | stonghold_web_server | 2.0.1 | |
c2net | stonghold_web_server | 2.2 | |
c2net | stonghold_web_server | 2.3 | |
hp | open_market_secure_webserver | 2.1 | |
microsoft | exchange_server | 5.5 | |
microsoft | internet_information_server | 3.0 | |
microsoft | internet_information_server | 4.0 | |
microsoft | site_server | 3.0 | |
netscape | certificate_server | 1.0 | |
netscape | collabra_server | 3.5.2 | |
netscape | directory_server | 1.3 | |
netscape | directory_server | 3.1 | |
netscape | directory_server | 3.12 | |
netscape | enterprise_server | 2.0 | |
netscape | enterprise_server | 3.0.1b | |
netscape | enterprise_server | 3.5.1 | |
netscape | fasttrack_server | 3.01b | |
netscape | messaging_server | 3.54 | |
netscape | proxy_server | 3.5.1 | |
ssleay | ssleay | 0.6.6 | |
ssleay | ssleay | 0.8.1 | |
ssleay | ssleay | 0.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "90FA74D1-FF25-44C0-B86C-FBE74A0206CB", "vulnerable": true }, { "criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.2:*:*:*:*:*:*:*", "matchCriteriaId": "7E7F153A-5396-4C3C-995B-570D13DB6B2C", "vulnerable": true }, { "criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.3:*:*:*:*:*:*:*", "matchCriteriaId": "BBDFAE58-F8CC-453F-A006-532212B21F94", "vulnerable": true }, { "criteria": "cpe:2.3:a:hp:open_market_secure_webserver:2.1:*:*:*:*:*:*:*", "matchCriteriaId": "CA2E007E-898A-4EC7-9040-A02DABA3A5B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*", "matchCriteriaId": "B4F9C143-4734-4E5D-9281-F51513C5CAAF", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "547AB6E2-4E9F-4783-8BB4-0AE297A38C9C", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*", "matchCriteriaId": "5D47E9C4-5439-4A82-BBD8-D6B482B47E51", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*", "matchCriteriaId": "4A503018-356B-46D9-965F-60750B5B7484", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*", "matchCriteriaId": "72E930EF-CCEC-44EA-AA45-18644EFDA5F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:collabra_server:3.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "B49C090C-979F-44F2-BAAC-71E11611BDF6", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*", "matchCriteriaId": "1CD1E4C9-BFF1-4818-A1B8-ECD7B54C8B03", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*", "matchCriteriaId": "492922BE-3B31-486C-94B5-114089E51E53", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*", "matchCriteriaId": "70E0FF18-9B01-4500-9599-8F085655C388", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "9E5E0298-99D9-476D-A7DF-36C6207482DB", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*", "matchCriteriaId": "D94D2CA3-9868-4F27-B31D-D3EDC256BE5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "4147A43C-DA7B-4D08-90E9-72DE57B1D61D", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:fasttrack_server:3.01b:*:*:*:*:*:*:*", "matchCriteriaId": "55193435-0136-422D-A936-B1FEEC328A0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:messaging_server:3.54:*:*:*:*:*:*:*", "matchCriteriaId": "11AA27C0-D579-49E6-8479-D5DFFAC96D4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:netscape:proxy_server:3.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E47FCF41-3D06-493B-AD7B-626F4C279944", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssleay:ssleay:0.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "64568219-B33C-4507-9E04-536E7B11D2F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "29C56055-3DB2-4A23-8301-6F6AB4BA38AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*", "matchCriteriaId": "76F1B179-25A4-4A72-9E42-43DA61CA1475", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Information from SSL-encrypted sessions via PKCS #1." } ], "id": "CVE-1999-0007", "lastModified": "2024-11-20T23:27:35.517", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "1998-06-26T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-327" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2001-06-02 04:00
Modified
2024-11-20 23:34
Severity ?
Summary
Buffer overflow in Netscape Directory Server 4.12 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed recipient field.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netscape | directory_server | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netscape:directory_server:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FB58A05-9B80-4B7F-BCF4-BD1180E604DF", "versionEndIncluding": "4.12", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Buffer overflow in Netscape Directory Server 4.12 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed recipient field." } ], "id": "CVE-2001-0164", "lastModified": "2024-11-20T23:34:44.900", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 7.5, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2001-06-02T04:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.atstake.com/research/advisories/2001/a030701-1.txt" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6233" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.atstake.com/research/advisories/2001/a030701-1.txt" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6233" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2000-12-11 05:00
Modified
2024-11-20 23:33
Severity ?
Summary
Directory traversal vulnerability in iPlanet Certificate Management System 4.2 and Directory Server 4.12 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the Agent, End Entity, or Administrator services.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
netscape | directory_server | 4.12 | |
sun | iplanet_certificate_management_system | 4.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:netscape:directory_server:4.12:*:*:*:*:*:*:*", "matchCriteriaId": "025DC6F0-A1FF-4325-8F58-2337BA961DBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:sun:iplanet_certificate_management_system:4.2:*:*:*:*:*:*:*", "matchCriteriaId": "FEBFF8AA-E42A-4CE9-AD08-4A1BBFFD3A90", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in iPlanet Certificate Management System 4.2 and Directory Server 4.12 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the Agent, End Entity, or Administrator services." } ], "id": "CVE-2000-1075", "lastModified": "2024-11-20T23:33:57.167", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.0, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2000-12-11T05:00:00.000", "references": [ { "source": "cve@mitre.org", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "source": "cve@mitre.org", "url": "http://www.iplanet.com/downloads/patches/0122.html" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/4086" }, { "source": "cve@mitre.org", "url": "http://www.osvdb.org/486" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1839" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5421" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.iplanet.com/downloads/patches/0122.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/4086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.osvdb.org/486" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Patch", "Vendor Advisory" ], "url": "http://www.securityfocus.com/bid/1839" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5421" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-1999-0807
Vulnerability from cvelistv5
Published
2000-01-04 05:00
Modified
2024-08-01 16:48
Severity ?
EPSS score ?
Summary
The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users.
References
▼ | URL | Tags |
---|---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807 | x_refsource_MISC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:48:37.995Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-08-17T07:59:06", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0807", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Netscape Directory Server installation procedure leaves sensitive information in a file that is accessible to local users." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0807" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0807", "datePublished": "2000-01-04T05:00:00", "dateReserved": "1999-11-25T00:00:00", "dateUpdated": "2024-08-01T16:48:37.995Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-1236
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
EPSS score ?
Summary
Buffer overflow in the LDAP component for Netscape Directory Server (NDS) 3.6 on HP-UX and other operating systems allows remote attackers to execute arbitrary code.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/12099 | vdb-entry, x_refsource_BID | |
http://sunsolve.sun.com/search/document.do?assetkey=1-26-57754-1 | vendor-advisory, x_refsource_SUNALERT | |
http://secunia.com/advisories/14960 | third-party-advisory, x_refsource_SECUNIA | |
http://marc.info/?l=bugtraq&m=110384298016120 | vendor-advisory, x_refsource_HP | |
http://www.kb.cert.org/vuls/id/258905 | third-party-advisory, x_refsource_CERT-VN | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/18676 | vdb-entry, x_refsource_XF | |
http://www.ciac.org/ciac/bulletins/p-083.shtml | third-party-advisory, government-resource, x_refsource_CIAC |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:46:12.397Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "12099", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/12099" }, { "name": "57754", "tags": [ "vendor-advisory", "x_refsource_SUNALERT", "x_transferred" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57754-1" }, { "name": "14960", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/14960" }, { "name": "SSRT4867", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=110384298016120" }, { "name": "VU#258905", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/258905" }, { "name": "nds-ldap-bo(18676)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18676" }, { "name": "P-083", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC", "x_transferred" ], "url": "http://www.ciac.org/ciac/bulletins/p-083.shtml" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-12-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in the LDAP component for Netscape Directory Server (NDS) 3.6 on HP-UX and other operating systems allows remote attackers to execute arbitrary code." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "12099", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/12099" }, { "name": "57754", "tags": [ "vendor-advisory", "x_refsource_SUNALERT" ], "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57754-1" }, { "name": "14960", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/14960" }, { "name": "SSRT4867", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=110384298016120" }, { "name": "VU#258905", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/258905" }, { "name": "nds-ldap-bo(18676)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18676" }, { "name": "P-083", "tags": [ "third-party-advisory", "government-resource", "x_refsource_CIAC" ], "url": "http://www.ciac.org/ciac/bulletins/p-083.shtml" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-1236", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in the LDAP component for Netscape Directory Server (NDS) 3.6 on HP-UX and other operating systems allows remote attackers to execute arbitrary code." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "12099", "refsource": "BID", "url": "http://www.securityfocus.com/bid/12099" }, { "name": "57754", "refsource": "SUNALERT", "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57754-1" }, { "name": "14960", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/14960" }, { "name": "SSRT4867", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=110384298016120" }, { "name": "VU#258905", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/258905" }, { "name": "nds-ldap-bo(18676)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18676" }, { "name": "P-083", "refsource": "CIAC", "url": "http://www.ciac.org/ciac/bulletins/p-083.shtml" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-1236", "datePublished": "2005-01-06T05:00:00", "dateReserved": "2004-12-15T00:00:00", "dateUpdated": "2024-08-08T00:46:12.397Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2001-0164
Vulnerability from cvelistv5
Published
2001-09-18 04:00
Modified
2024-08-08 04:06
Severity ?
EPSS score ?
Summary
Buffer overflow in Netscape Directory Server 4.12 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed recipient field.
References
▼ | URL | Tags |
---|---|---|
http://www.atstake.com/research/advisories/2001/a030701-1.txt | vendor-advisory, x_refsource_ATSTAKE | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/6233 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T04:06:55.592Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "A030701-1", "tags": [ "vendor-advisory", "x_refsource_ATSTAKE", "x_transferred" ], "url": "http://www.atstake.com/research/advisories/2001/a030701-1.txt" }, { "name": "netscape-directory-server-bo(6233)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6233" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2001-03-07T00:00:00", "descriptions": [ { "lang": "en", "value": "Buffer overflow in Netscape Directory Server 4.12 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed recipient field." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "A030701-1", "tags": [ "vendor-advisory", "x_refsource_ATSTAKE" ], "url": "http://www.atstake.com/research/advisories/2001/a030701-1.txt" }, { "name": "netscape-directory-server-bo(6233)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6233" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2001-0164", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Buffer overflow in Netscape Directory Server 4.12 and earlier allows remote attackers to cause a denial of service or execute arbitrary commands via a malformed recipient field." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "A030701-1", "refsource": "ATSTAKE", "url": "http://www.atstake.com/research/advisories/2001/a030701-1.txt" }, { "name": "netscape-directory-server-bo(6233)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/6233" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2001-0164", "datePublished": "2001-09-18T04:00:00", "dateReserved": "2001-03-07T00:00:00", "dateUpdated": "2024-08-08T04:06:55.592Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-1999-0007
Vulnerability from cvelistv5
Published
1999-09-29 04:00
Modified
2024-08-01 16:27
Severity ?
EPSS score ?
Summary
Information from SSL-encrypted sessions via PKCS #1.
References
▼ | URL | Tags |
---|---|---|
https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 | vendor-advisory, x_refsource_MS |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T16:27:56.484Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "MS98-002", "tags": [ "vendor-advisory", "x_refsource_MS", "x_transferred" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Information from SSL-encrypted sessions via PKCS #1." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2005-11-02T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "MS98-002", "tags": [ "vendor-advisory", "x_refsource_MS" ], "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-1999-0007", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Information from SSL-encrypted sessions via PKCS #1." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "MS98-002", "refsource": "MS", "url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-1999-0007", "datePublished": "1999-09-29T04:00:00", "dateReserved": "1999-06-07T00:00:00", "dateUpdated": "2024-08-01T16:27:56.484Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2004-0826
Vulnerability from cvelistv5
Published
2004-09-02 04:00
Modified
2024-08-08 00:31
Severity ?
EPSS score ?
Summary
Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/11015 | vdb-entry, x_refsource_BID | |
http://xforce.iss.net/xforce/alerts/id/180 | third-party-advisory, x_refsource_ISS | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/16314 | vdb-entry, x_refsource_XF | |
http://marc.info/?l=bugtraq&m=109351293827731&w=2 | vendor-advisory, x_refsource_HP |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T00:31:47.919Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "11015", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/11015" }, { "name": "20040823 Netscape NSS Library Remote Compromise", "tags": [ "third-party-advisory", "x_refsource_ISS", "x_transferred" ], "url": "http://xforce.iss.net/xforce/alerts/id/180" }, { "name": "sslv2-client-hello-overflow(16314)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314" }, { "name": "SSRT4779", "tags": [ "vendor-advisory", "x_refsource_HP", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2004-08-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-10T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "11015", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/11015" }, { "name": "20040823 Netscape NSS Library Remote Compromise", "tags": [ "third-party-advisory", "x_refsource_ISS" ], "url": "http://xforce.iss.net/xforce/alerts/id/180" }, { "name": "sslv2-client-hello-overflow(16314)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314" }, { "name": "SSRT4779", "tags": [ "vendor-advisory", "x_refsource_HP" ], "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2004-0826", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in Netscape Network Security Services (NSS) library allows remote attackers to execute arbitrary code via a modified record length field in an SSLv2 client hello message." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "11015", "refsource": "BID", "url": "http://www.securityfocus.com/bid/11015" }, { "name": "20040823 Netscape NSS Library Remote Compromise", "refsource": "ISS", "url": "http://xforce.iss.net/xforce/alerts/id/180" }, { "name": "sslv2-client-hello-overflow(16314)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/16314" }, { "name": "SSRT4779", "refsource": "HP", "url": "http://marc.info/?l=bugtraq\u0026m=109351293827731\u0026w=2" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2004-0826", "datePublished": "2004-09-02T04:00:00", "dateReserved": "2004-08-27T00:00:00", "dateUpdated": "2024-08-08T00:31:47.919Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1076
Vulnerability from cvelistv5
Published
2000-11-29 05:00
Modified
2024-08-08 05:45
Severity ?
EPSS score ?
Summary
Netscape (iPlanet) Certificate Management System 4.2 and Directory Server 4.12 stores the administrative password in plaintext, which could allow local and possibly remote attackers to gain administrative privileges on the server.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html | mailing-list, x_refsource_BUGTRAQ | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5422 | vdb-entry, x_refsource_XF |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:45:37.277Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001026 [CORE SDI ADVISORY] iPlanet Certificate Management System 4.2 path traversal bug", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "name": "iplanet-netscape-plaintext-password(5422)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5422" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Netscape (iPlanet) Certificate Management System 4.2 and Directory Server 4.12 stores the administrative password in plaintext, which could allow local and possibly remote attackers to gain administrative privileges on the server." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-12-18T21:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001026 [CORE SDI ADVISORY] iPlanet Certificate Management System 4.2 path traversal bug", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "name": "iplanet-netscape-plaintext-password(5422)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5422" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1076", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Netscape (iPlanet) Certificate Management System 4.2 and Directory Server 4.12 stores the administrative password in plaintext, which could allow local and possibly remote attackers to gain administrative privileges on the server." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001026 [CORE SDI ADVISORY] iPlanet Certificate Management System 4.2 path traversal bug", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "name": "iplanet-netscape-plaintext-password(5422)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5422" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1076", "datePublished": "2000-11-29T05:00:00", "dateReserved": "2000-11-29T00:00:00", "dateUpdated": "2024-08-08T05:45:37.277Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2000-1075
Vulnerability from cvelistv5
Published
2001-05-07 04:00
Modified
2024-08-08 05:45
Severity ?
EPSS score ?
Summary
Directory traversal vulnerability in iPlanet Certificate Management System 4.2 and Directory Server 4.12 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the Agent, End Entity, or Administrator services.
References
▼ | URL | Tags |
---|---|---|
http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html | mailing-list, x_refsource_BUGTRAQ | |
http://www.securityfocus.com/bid/1839 | vdb-entry, x_refsource_BID | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/5421 | vdb-entry, x_refsource_XF | |
http://www.iplanet.com/downloads/patches/0122.html | x_refsource_CONFIRM | |
http://www.osvdb.org/4086 | vdb-entry, x_refsource_OSVDB | |
http://www.osvdb.org/486 | vdb-entry, x_refsource_OSVDB |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T05:45:36.500Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20001026 [CORE SDI ADVISORY] iPlanet Certificate Management System 4.2 path traversal bug", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "name": "1839", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/1839" }, { "name": "iplanet-netscape-directory-traversal(5421)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5421" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.iplanet.com/downloads/patches/0122.html" }, { "name": "4086", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/4086" }, { "name": "486", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/486" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2000-10-26T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in iPlanet Certificate Management System 4.2 and Directory Server 4.12 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the Agent, End Entity, or Administrator services." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2004-09-02T09:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20001026 [CORE SDI ADVISORY] iPlanet Certificate Management System 4.2 path traversal bug", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "name": "1839", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/1839" }, { "name": "iplanet-netscape-directory-traversal(5421)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5421" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.iplanet.com/downloads/patches/0122.html" }, { "name": "4086", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/4086" }, { "name": "486", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/486" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2000-1075", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in iPlanet Certificate Management System 4.2 and Directory Server 4.12 allows remote attackers to read arbitrary files via a .. (dot dot) attack in the Agent, End Entity, or Administrator services." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20001026 [CORE SDI ADVISORY] iPlanet Certificate Management System 4.2 path traversal bug", "refsource": "BUGTRAQ", "url": "http://archives.neohapsis.com/archives/bugtraq/2000-10/0383.html" }, { "name": "1839", "refsource": "BID", "url": "http://www.securityfocus.com/bid/1839" }, { "name": "iplanet-netscape-directory-traversal(5421)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/5421" }, { "name": "http://www.iplanet.com/downloads/patches/0122.html", "refsource": "CONFIRM", "url": "http://www.iplanet.com/downloads/patches/0122.html" }, { "name": "4086", "refsource": "OSVDB", "url": "http://www.osvdb.org/4086" }, { "name": "486", "refsource": "OSVDB", "url": "http://www.osvdb.org/486" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2000-1075", "datePublished": "2001-05-07T04:00:00", "dateReserved": "2000-11-29T00:00:00", "dateUpdated": "2024-08-08T05:45:36.500Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }