Search criteria
3 vulnerabilities found for aserver by hp
CVE-2000-0005 (GCVE-0-2000-0005)
Vulnerability from cvelistv5 – Published: 2000-02-04 05:00 – Updated: 2024-08-08 04:58
VLAI?
Summary
HP-UX aserver program allows local users to gain privileges via a symlink attack.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:58:11.797Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:5635",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-12-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "HP-UX aserver program allows local users to gain privileges via a symlink attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-18T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "oval:org.mitre.oval:def:5635",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0005",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "HP-UX aserver program allows local users to gain privileges via a symlink attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:5635",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0005",
"datePublished": "2000-02-04T05:00:00",
"dateReserved": "2000-01-11T00:00:00",
"dateUpdated": "2024-08-08T04:58:11.797Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2000-0005 (GCVE-0-2000-0005)
Vulnerability from nvd – Published: 2000-02-04 05:00 – Updated: 2024-08-08 04:58
VLAI?
Summary
HP-UX aserver program allows local users to gain privileges via a symlink attack.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:58:11.797Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "oval:org.mitre.oval:def:5635",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL",
"x_transferred"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "1999-12-30T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "HP-UX aserver program allows local users to gain privileges via a symlink attack."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-10-18T16:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "oval:org.mitre.oval:def:5635",
"tags": [
"vdb-entry",
"signature",
"x_refsource_OVAL"
],
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2000-0005",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "HP-UX aserver program allows local users to gain privileges via a symlink attack."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "oval:org.mitre.oval:def:5635",
"refsource": "OVAL",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2000-0005",
"datePublished": "2000-02-04T05:00:00",
"dateReserved": "2000-01-11T00:00:00",
"dateUpdated": "2024-08-08T04:58:11.797Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
FKIE_CVE-2000-0005
Vulnerability from fkie_nvd - Published: 1999-01-02 05:00 - Updated: 2025-04-03 01:03
Severity ?
Summary
HP-UX aserver program allows local users to gain privileges via a symlink attack.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| hp | hp-ux | 7.00 | |
| hp | hp-ux | 7.02 | |
| hp | hp-ux | 7.04 | |
| hp | hp-ux | 7.06 | |
| hp | hp-ux | 7.08 | |
| hp | hp-ux | 8.00 | |
| hp | hp-ux | 8.01 | |
| hp | hp-ux | 8.02 | |
| hp | hp-ux | 8.04 | |
| hp | hp-ux | 8.05 | |
| hp | hp-ux | 8.06 | |
| hp | hp-ux | 8.07 | |
| hp | hp-ux | 8.08 | |
| hp | hp-ux | 8.09 | |
| hp | hp-ux | 9.00 | |
| hp | hp-ux | 9.01 | |
| hp | hp-ux | 9.03 | |
| hp | hp-ux | 9.04 | |
| hp | hp-ux | 9.05 | |
| hp | hp-ux | 9.06 | |
| hp | hp-ux | 9.07 | |
| hp | hp-ux | 9.08 | |
| hp | hp-ux | 9.09 | |
| hp | hp-ux | 9.10 | |
| hp | hp-ux | 10.00 | |
| hp | hp-ux | 10.01 | |
| hp | hp-ux | 10.08 | |
| hp | hp-ux | 10.09 | |
| hp | hp-ux | 10.10 | |
| hp | hp-ux | 10.16 | |
| hp | hp-ux | 10.20 | |
| hp | hp-ux | 10.24 | |
| hp | hp-ux | 10.30 | |
| hp | hp-ux | 10.34 | |
| hp | hp-ux | 11.00 | |
| hp | aserver | * | |
| hp | 9000 | 7_800 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:hp:hp-ux:7.00:*:*:*:*:*:*:*",
"matchCriteriaId": "903312B4-BE2F-4170-AA8A-2802E2554662",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:7.02:*:*:*:*:*:*:*",
"matchCriteriaId": "4E21C6EC-D15D-487B-B2FA-BF32D9B8EA79",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:7.04:*:*:*:*:*:*:*",
"matchCriteriaId": "DC664E65-5C9C-4796-86E5-A0B2539ED793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:7.06:*:*:*:*:*:*:*",
"matchCriteriaId": "DA3F0D15-D854-4BD0-8590-9C941840BC5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:7.08:*:*:*:*:*:*:*",
"matchCriteriaId": "23628ED6-1EF9-494F-BBA0-DEC67A6B12E3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.00:*:*:*:*:*:*:*",
"matchCriteriaId": "A573388D-BD8F-48D3-8BA9-E4D11402CA22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.01:*:*:*:*:*:*:*",
"matchCriteriaId": "9B172217-D993-4D8C-8E37-4D966D103AAF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.02:*:*:*:*:*:*:*",
"matchCriteriaId": "6973B4FC-8009-4336-BED4-7B032EA1E570",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.04:*:*:*:*:*:*:*",
"matchCriteriaId": "2777DC9F-683A-4892-B305-4EFEFDDBCCE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.05:*:*:*:*:*:*:*",
"matchCriteriaId": "31B1ADC1-9B6D-4B5E-A05A-D69599A3A0D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.06:*:*:*:*:*:*:*",
"matchCriteriaId": "D0EB2E93-9774-442C-BB60-E428F53EE6F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.07:*:*:*:*:*:*:*",
"matchCriteriaId": "44521B9A-7796-4E4A-99F0-026D45BDB7B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.08:*:*:*:*:*:*:*",
"matchCriteriaId": "F489B454-F1ED-4DEA-8248-A97D68611FCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:8.09:*:*:*:*:*:*:*",
"matchCriteriaId": "C6296277-D10E-4CAA-96F5-BEB61B4640FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.00:*:*:*:*:*:*:*",
"matchCriteriaId": "6E436D06-FA3A-43F6-AF84-2E9C2F42E3FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.01:*:*:*:*:*:*:*",
"matchCriteriaId": "DCB1B6DC-4FF9-40DC-BAD5-91A04E79981E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.03:*:*:*:*:*:*:*",
"matchCriteriaId": "E7FA635E-C0FE-495C-A2BB-D9C30A95FD00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.04:*:*:*:*:*:*:*",
"matchCriteriaId": "E178238D-E17A-48C9-8922-AC92474BDF55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.05:*:*:*:*:*:*:*",
"matchCriteriaId": "560C17E1-6154-4291-A838-5E76139B9FB5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.06:*:*:*:*:*:*:*",
"matchCriteriaId": "3194CFA3-F0B3-487A-99C6-1A7DF1EF0586",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.07:*:*:*:*:*:*:*",
"matchCriteriaId": "035890F7-BF48-4669-812A-1DCBD91A8F34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.08:*:*:*:*:*:*:*",
"matchCriteriaId": "F9AED8F3-2501-444D-8141-37FEE2246747",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.09:*:*:*:*:*:*:*",
"matchCriteriaId": "10974B0F-DA3A-4E3E-8914-8CEB366E9CC4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:9.10:*:*:*:*:*:*:*",
"matchCriteriaId": "C54F7F74-7DD7-431E-AE75-1D1199D63032",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
"matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
"matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
"matchCriteriaId": "2170549C-80D2-4FF8-AC07-BD4124125B02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*",
"matchCriteriaId": "066D4E93-366F-42D4-B27D-8AF981F5F2AD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
"matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
"matchCriteriaId": "38E41C26-A086-4C9C-83D8-CB910F4B67F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
"matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
"matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
"matchCriteriaId": "CFD50216-90AC-480E-A11C-E88E64C6D84A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:hp:aserver:*:*:*:*:*:*:*:*",
"matchCriteriaId": "F978F803-AC52-4856-A86F-CD53E9F6C6D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:h:hp:9000:7_800:*:*:*:*:*:*:*",
"matchCriteriaId": "587A1F2E-EBE3-4349-A859-A2B780C51CC4",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "HP-UX aserver program allows local users to gain privileges via a symlink attack."
}
],
"id": "CVE-2000-0005",
"lastModified": "2025-04-03T01:03:51.193",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.2,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "1999-01-02T05:00:00.000",
"references": [
{
"source": "cve@mitre.org",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5635"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}