ID OSVDB:7592
Type osvdb
Reporter OSVDB
Modified 1999-12-09T00:00:00
Description
No description provided by the source
References:
Vendor Specific Advisory URL
ISS X-Force ID: 3707
CVE-1999-0978
Bugtraq ID: 867
{"title": "ht://Dig Shell Escape Arbitrary Command Execution", "published": "1999-12-09T00:00:00", "references": [], "type": "osvdb", "enchantments": {"vulnersScore": 7.5}, "cvelist": ["CVE-1999-0978"], "viewCount": 0, "affectedSoftware": [], "hash": "36e7b2dba49d091efc924846592d0f4299e3722cfd7dc9e03bcbf3e997ec489a", "id": "OSVDB:7592", "modified": "1999-12-09T00:00:00", "history": [], "href": "https://vulners.com/osvdb/OSVDB:7592", "hashmap": [{"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "affectedSoftware"}, {"hash": "f9fa10ba956cacf91d7878861139efb9", "key": "bulletinFamily"}, {"hash": "62ed3239449a29eed61d98b30d5ffc3d", "key": "cvelist"}, {"hash": "e5d275b3ebd62646b78320753699e02e", "key": "cvss"}, {"hash": "342f95e38fb12f4a26644bfa4941b126", "key": "description"}, {"hash": "93468c0e6926782ad323d5751d720b80", "key": "href"}, {"hash": "37f1613cc1af6e781ed13f54a358c96d", "key": "modified"}, {"hash": "56765472680401499c79732468ba4340", "key": "objectVersion"}, {"hash": "37f1613cc1af6e781ed13f54a358c96d", "key": "published"}, {"hash": "d41d8cd98f00b204e9800998ecf8427e", "key": "references"}, {"hash": "955b328dc7cd615c13af5464c9183464", "key": "reporter"}, {"hash": "ff3cf469f9fabc1a0bac1cdab7dbb00a", "key": "title"}, {"hash": "1327ac71f7914948578f08c54f772b10", "key": "type"}], "objectVersion": "1.2", "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.debian.org/security/1999/19991209)\nISS X-Force ID: 3707\n[CVE-1999-0978](https://vulners.com/cve/CVE-1999-0978)\nBugtraq ID: 867\n", "bulletinFamily": "software", "reporter": "OSVDB", "cvss": {"vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/", "score": 7.5}, "lastseen": "2017-04-28T13:20:02"}
{"result": {"cve": [{"id": "CVE-1999-0978", "type": "cve", "title": "CVE-1999-0978", "description": "htdig allows remote attackers to execute commands via filenames with shell metacharacters.", "published": "1999-12-09T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-1999-0978", "cvelist": ["CVE-1999-0978"], "lastseen": "2016-09-03T02:22:16"}], "osvdb": [{"id": "OSVDB:1160", "type": "osvdb", "title": "ht://Dig Filename Shell Metacharacter Arbitrary Command Execution", "description": "# No description provided by the source\n\n## References:\n[CVE-1999-0978](https://vulners.com/cve/CVE-1999-0978)\nBugtraq ID: 867\n", "published": "1999-12-09T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://vulners.com/osvdb/OSVDB:1160", "cvelist": ["CVE-1999-0978"], "lastseen": "2017-04-28T13:19:55"}], "nessus": [{"id": "HTDIG.NASL", "type": "nessus", "title": "ht://Dig < 3.1.5 htsearch CGI Multiple Vulnerabilities", "description": "The 'htsearch' CGI, which is part of the htdig package, allows anyone to read arbitrary files on the target host.", "published": "2000-03-03T00:00:00", "cvss": {"score": 7.5, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:PARTIAL/I:PARTIAL/A:PARTIAL/"}, "href": "https://www.tenable.com/plugins/index.php?view=single&id=10105", "cvelist": ["CVE-1999-0978", "CVE-2000-0208"], "lastseen": "2016-09-26T17:23:41"}]}}