FKIE_CVE-1999-0007
Vulnerability from fkie_nvd - Published: 1998-06-26 04:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
Information from SSL-encrypted sessions via PKCS #1.
References
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002 | Patch, Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| c2net | stonghold_web_server | 2.0.1 | |
| c2net | stonghold_web_server | 2.2 | |
| c2net | stonghold_web_server | 2.3 | |
| hp | open_market_secure_webserver | 2.1 | |
| microsoft | exchange_server | 5.5 | |
| microsoft | internet_information_server | 3.0 | |
| microsoft | internet_information_server | 4.0 | |
| microsoft | site_server | 3.0 | |
| netscape | certificate_server | 1.0 | |
| netscape | collabra_server | 3.5.2 | |
| netscape | directory_server | 1.3 | |
| netscape | directory_server | 3.1 | |
| netscape | directory_server | 3.12 | |
| netscape | enterprise_server | 2.0 | |
| netscape | enterprise_server | 3.0.1b | |
| netscape | enterprise_server | 3.5.1 | |
| netscape | fasttrack_server | 3.01b | |
| netscape | messaging_server | 3.54 | |
| netscape | proxy_server | 3.5.1 | |
| ssleay | ssleay | 0.6.6 | |
| ssleay | ssleay | 0.8.1 | |
| ssleay | ssleay | 0.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "90FA74D1-FF25-44C0-B86C-FBE74A0206CB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7E7F153A-5396-4C3C-995B-570D13DB6B2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:c2net:stonghold_web_server:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BBDFAE58-F8CC-453F-A006-532212B21F94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:hp:open_market_secure_webserver:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA2E007E-898A-4EC7-9040-A02DABA3A5B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:exchange_server:5.5:-:*:*:*:*:*:*",
"matchCriteriaId": "B4F9C143-4734-4E5D-9281-F51513C5CAAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:internet_information_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "547AB6E2-4E9F-4783-8BB4-0AE297A38C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:internet_information_server:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "5D47E9C4-5439-4A82-BBD8-D6B482B47E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:microsoft:site_server:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A503018-356B-46D9-965F-60750B5B7484",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:certificate_server:1.0:patch1:*:*:*:*:*:*",
"matchCriteriaId": "72E930EF-CCEC-44EA-AA45-18644EFDA5F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:collabra_server:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B49C090C-979F-44F2-BAAC-71E11611BDF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:directory_server:1.3:patch5:*:*:*:*:*:*",
"matchCriteriaId": "1CD1E4C9-BFF1-4818-A1B8-ECD7B54C8B03",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:directory_server:3.1:patch1:*:*:*:*:*:*",
"matchCriteriaId": "492922BE-3B31-486C-94B5-114089E51E53",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:directory_server:3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "70E0FF18-9B01-4500-9599-8F085655C388",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:enterprise_server:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9E5E0298-99D9-476D-A7DF-36C6207482DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:enterprise_server:3.0.1b:*:*:*:*:*:*:*",
"matchCriteriaId": "D94D2CA3-9868-4F27-B31D-D3EDC256BE5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:enterprise_server:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "4147A43C-DA7B-4D08-90E9-72DE57B1D61D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:fasttrack_server:3.01b:*:*:*:*:*:*:*",
"matchCriteriaId": "55193435-0136-422D-A936-B1FEEC328A0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:messaging_server:3.54:*:*:*:*:*:*:*",
"matchCriteriaId": "11AA27C0-D579-49E6-8479-D5DFFAC96D4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:netscape:proxy_server:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E47FCF41-3D06-493B-AD7B-626F4C279944",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssleay:ssleay:0.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "64568219-B33C-4507-9E04-536E7B11D2F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssleay:ssleay:0.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "29C56055-3DB2-4A23-8301-6F6AB4BA38AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:ssleay:ssleay:0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "76F1B179-25A4-4A72-9E42-43DA61CA1475",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Information from SSL-encrypted sessions via PKCS #1."
}
],
"id": "CVE-1999-0007",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "1998-06-26T04:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://docs.microsoft.com/en-us/security-updates/securitybulletins/1998/ms98-002"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-327"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…